General
-
Target
de3c8d07361d0428bb80b43d75e114a1306715a4f95742de0437372b08bb4177
-
Size
689KB
-
Sample
241106-kf2xlawlds
-
MD5
e1a3cb2ebdd8d986e1270f0f9cba39fa
-
SHA1
7ea5c88504c2038627224a4319bbeb8e93b8f612
-
SHA256
de3c8d07361d0428bb80b43d75e114a1306715a4f95742de0437372b08bb4177
-
SHA512
0fa626bc7e9d04127d39c52411c3c284b73eb55d1367f9e6f6fd99b4c45ee8080ff19d260cfcc275c8740bd5fe29af6653c267aa66afbd8ff2ad1312f3a84ed1
-
SSDEEP
12288:nMrWy90viSEi7MdrsCggfcyEQNz2KcweNuZGsIXRMCFNH/aC:VyBi7A1fnZfepSwNH/aC
Static task
static1
Behavioral task
behavioral1
Sample
de3c8d07361d0428bb80b43d75e114a1306715a4f95742de0437372b08bb4177.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
de3c8d07361d0428bb80b43d75e114a1306715a4f95742de0437372b08bb4177
-
Size
689KB
-
MD5
e1a3cb2ebdd8d986e1270f0f9cba39fa
-
SHA1
7ea5c88504c2038627224a4319bbeb8e93b8f612
-
SHA256
de3c8d07361d0428bb80b43d75e114a1306715a4f95742de0437372b08bb4177
-
SHA512
0fa626bc7e9d04127d39c52411c3c284b73eb55d1367f9e6f6fd99b4c45ee8080ff19d260cfcc275c8740bd5fe29af6653c267aa66afbd8ff2ad1312f3a84ed1
-
SSDEEP
12288:nMrWy90viSEi7MdrsCggfcyEQNz2KcweNuZGsIXRMCFNH/aC:VyBi7A1fnZfepSwNH/aC
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1