General
-
Target
4685c5dbf089fc82a05a20ae8660e8d899130f22b64e542c78afbcca4c68a29a
-
Size
673KB
-
Sample
241106-lphqrazpgj
-
MD5
df4e8f41452feda3dbd0549c51ffa506
-
SHA1
44e466d9dad0a5761c26f85502c3b5a9744e3ac3
-
SHA256
4685c5dbf089fc82a05a20ae8660e8d899130f22b64e542c78afbcca4c68a29a
-
SHA512
4e3e759f2e2a254f4f94dda75577c4b5a8ccf897ed01a962b9c36f27a16286d270327a33ec94c8a06eb5a6b18e0a1cf8a84269b113ba8b0980e137160c40cbe9
-
SSDEEP
12288:YMr4y90urdADfrFb3ugoHx82M5rbuW6SfFWHfHPg:wyjduZrunR8x5/udvHI
Static task
static1
Behavioral task
behavioral1
Sample
4685c5dbf089fc82a05a20ae8660e8d899130f22b64e542c78afbcca4c68a29a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
4685c5dbf089fc82a05a20ae8660e8d899130f22b64e542c78afbcca4c68a29a
-
Size
673KB
-
MD5
df4e8f41452feda3dbd0549c51ffa506
-
SHA1
44e466d9dad0a5761c26f85502c3b5a9744e3ac3
-
SHA256
4685c5dbf089fc82a05a20ae8660e8d899130f22b64e542c78afbcca4c68a29a
-
SHA512
4e3e759f2e2a254f4f94dda75577c4b5a8ccf897ed01a962b9c36f27a16286d270327a33ec94c8a06eb5a6b18e0a1cf8a84269b113ba8b0980e137160c40cbe9
-
SSDEEP
12288:YMr4y90urdADfrFb3ugoHx82M5rbuW6SfFWHfHPg:wyjduZrunR8x5/udvHI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1