General
-
Target
273cb96e6e01655dd4f2e07de08485727e9c8372777914513edf608529c65f32
-
Size
537KB
-
Sample
241106-lmax5azpbp
-
MD5
8ab26fc5e0479b63514407c6e6d7db21
-
SHA1
48b14cd27cd2886a37f78a371ba8d209422a43ae
-
SHA256
273cb96e6e01655dd4f2e07de08485727e9c8372777914513edf608529c65f32
-
SHA512
69e8878dde7e7d6563d29cfce060126b47decc1b7700cb0a611fc70dec49b8adc5f1a4298d1f04e98918adfc3f6f9f6cbc13dada08cd9296f529250d03d96ce4
-
SSDEEP
12288:7Mrpy90myLNLGSj9XtBQRIyy4zyyU4AHKwm4ESuJtZU0/UDcIhPS:Wy2bjlYIN4Oyaqw8tp/UXh6
Static task
static1
Behavioral task
behavioral1
Sample
273cb96e6e01655dd4f2e07de08485727e9c8372777914513edf608529c65f32.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
273cb96e6e01655dd4f2e07de08485727e9c8372777914513edf608529c65f32
-
Size
537KB
-
MD5
8ab26fc5e0479b63514407c6e6d7db21
-
SHA1
48b14cd27cd2886a37f78a371ba8d209422a43ae
-
SHA256
273cb96e6e01655dd4f2e07de08485727e9c8372777914513edf608529c65f32
-
SHA512
69e8878dde7e7d6563d29cfce060126b47decc1b7700cb0a611fc70dec49b8adc5f1a4298d1f04e98918adfc3f6f9f6cbc13dada08cd9296f529250d03d96ce4
-
SSDEEP
12288:7Mrpy90myLNLGSj9XtBQRIyy4zyyU4AHKwm4ESuJtZU0/UDcIhPS:Wy2bjlYIN4Oyaqw8tp/UXh6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1