General
-
Target
34dd1013fabd294ae993d5f542a0f053ee3800ed07f8d551d49d6fe37266ef18
-
Size
671KB
-
Sample
241106-l5q23axmds
-
MD5
e3885573664c05ae3809ab4cc7e1bc6d
-
SHA1
5e9727ec8a40fe137cfa690bedba418b2c317825
-
SHA256
34dd1013fabd294ae993d5f542a0f053ee3800ed07f8d551d49d6fe37266ef18
-
SHA512
1a3f341e18956d19cf4a6dd65ddb1b2024579d45cc61c7022532f7dc764f3d298d5be21764e1db031d6f2f46c80fc784f29aa459a0d0a3eea7f130b94ce224cd
-
SSDEEP
12288:SMr6y90TMKWcEARF6TKshbtBp7Tgzzv4bt9bLJa:8yU/E4ijbtBp7Mb4R9Y
Static task
static1
Behavioral task
behavioral1
Sample
34dd1013fabd294ae993d5f542a0f053ee3800ed07f8d551d49d6fe37266ef18.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
34dd1013fabd294ae993d5f542a0f053ee3800ed07f8d551d49d6fe37266ef18
-
Size
671KB
-
MD5
e3885573664c05ae3809ab4cc7e1bc6d
-
SHA1
5e9727ec8a40fe137cfa690bedba418b2c317825
-
SHA256
34dd1013fabd294ae993d5f542a0f053ee3800ed07f8d551d49d6fe37266ef18
-
SHA512
1a3f341e18956d19cf4a6dd65ddb1b2024579d45cc61c7022532f7dc764f3d298d5be21764e1db031d6f2f46c80fc784f29aa459a0d0a3eea7f130b94ce224cd
-
SSDEEP
12288:SMr6y90TMKWcEARF6TKshbtBp7Tgzzv4bt9bLJa:8yU/E4ijbtBp7Mb4R9Y
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1