General
-
Target
19ae89e5cd6eb2d3b7dbccad141bb3074680ae8bfc5498f434a05cc2a7c6f928
-
Size
521KB
-
Sample
241106-k4as1sxhpl
-
MD5
356b628be708a86f973cba3526e79b2b
-
SHA1
09d38094bfad86330a6b58487645ecf8ddc274dd
-
SHA256
19ae89e5cd6eb2d3b7dbccad141bb3074680ae8bfc5498f434a05cc2a7c6f928
-
SHA512
79d11effd8c677c283c48cfcf3f12c2efbab8b567e05cd9ae0a9d384d3226ebba201914f5eced44f0a2135745b3b86fabbc542806c0ff9766307a86101231345
-
SSDEEP
12288:EMrfy90mbm7bxrgKFvyrT0HM1ogFTOx+0cxlww0q:7yZK7bdgMyrg2oyKxrcrh0q
Static task
static1
Behavioral task
behavioral1
Sample
19ae89e5cd6eb2d3b7dbccad141bb3074680ae8bfc5498f434a05cc2a7c6f928.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
19ae89e5cd6eb2d3b7dbccad141bb3074680ae8bfc5498f434a05cc2a7c6f928
-
Size
521KB
-
MD5
356b628be708a86f973cba3526e79b2b
-
SHA1
09d38094bfad86330a6b58487645ecf8ddc274dd
-
SHA256
19ae89e5cd6eb2d3b7dbccad141bb3074680ae8bfc5498f434a05cc2a7c6f928
-
SHA512
79d11effd8c677c283c48cfcf3f12c2efbab8b567e05cd9ae0a9d384d3226ebba201914f5eced44f0a2135745b3b86fabbc542806c0ff9766307a86101231345
-
SSDEEP
12288:EMrfy90mbm7bxrgKFvyrT0HM1ogFTOx+0cxlww0q:7yZK7bdgMyrg2oyKxrcrh0q
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1