General
-
Target
a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365
-
Size
668KB
-
Sample
241106-kxt83sxgmq
-
MD5
387e1296304f1abd8525970aa8d402c1
-
SHA1
28b60283a3cb47757304dffaf607837c7839a7a8
-
SHA256
a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365
-
SHA512
b3a2db0ce13cc27036a2b8cd578020ec29eca72846a547682d23375f158ef822c9519e195bc0f276412c317632c6549a86b1bd08d855175da9ed555086f447f7
-
SSDEEP
12288:KMr9y90rD8JBvvZoZ+hDRx8oIS+47Y2XTOp3DYHy9PKxylyohM/0ONq0ov:7ypTWZ+9A4+SYfp38uixylpMsO3ov
Static task
static1
Behavioral task
behavioral1
Sample
a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365
-
Size
668KB
-
MD5
387e1296304f1abd8525970aa8d402c1
-
SHA1
28b60283a3cb47757304dffaf607837c7839a7a8
-
SHA256
a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365
-
SHA512
b3a2db0ce13cc27036a2b8cd578020ec29eca72846a547682d23375f158ef822c9519e195bc0f276412c317632c6549a86b1bd08d855175da9ed555086f447f7
-
SSDEEP
12288:KMr9y90rD8JBvvZoZ+hDRx8oIS+47Y2XTOp3DYHy9PKxylyohM/0ONq0ov:7ypTWZ+9A4+SYfp38uixylpMsO3ov
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1