General
-
Target
d57095c02158c2e8a2b14bceaa482a68df09144a90081db069cc4017aedacb50
-
Size
530KB
-
Sample
241106-k1deqsxdme
-
MD5
f1cdaa6cf4d70c383b9e5fa6b7b7819b
-
SHA1
db6b93650852d02329913df6108aae01ec683c78
-
SHA256
d57095c02158c2e8a2b14bceaa482a68df09144a90081db069cc4017aedacb50
-
SHA512
12d15330e430f1f3852539b8f8222a4bc2db85acc58260f9fda5986754eea5fbb162a8027d7aba4d1ecf6e0c3e0ed5b2a18869ec1d5ed593fc7a9e3760831b55
-
SSDEEP
12288:UMrOy90NfuxFYuaugOHBxGE8pxNtkDdCtxM4:Ky1WugAGE8DNSdCtxM4
Static task
static1
Behavioral task
behavioral1
Sample
d57095c02158c2e8a2b14bceaa482a68df09144a90081db069cc4017aedacb50.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d57095c02158c2e8a2b14bceaa482a68df09144a90081db069cc4017aedacb50
-
Size
530KB
-
MD5
f1cdaa6cf4d70c383b9e5fa6b7b7819b
-
SHA1
db6b93650852d02329913df6108aae01ec683c78
-
SHA256
d57095c02158c2e8a2b14bceaa482a68df09144a90081db069cc4017aedacb50
-
SHA512
12d15330e430f1f3852539b8f8222a4bc2db85acc58260f9fda5986754eea5fbb162a8027d7aba4d1ecf6e0c3e0ed5b2a18869ec1d5ed593fc7a9e3760831b55
-
SSDEEP
12288:UMrOy90NfuxFYuaugOHBxGE8pxNtkDdCtxM4:Ky1WugAGE8DNSdCtxM4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1