General
-
Target
146ff8e0d2679bbc8243c03855e8838254d26868497f20866bc0e66681c942df
-
Size
521KB
-
Sample
241106-lrmsgszqbq
-
MD5
82e1a4e5f1d566a730b983b48c832250
-
SHA1
e17430f25eb66271f563c757b0690c2ede462454
-
SHA256
146ff8e0d2679bbc8243c03855e8838254d26868497f20866bc0e66681c942df
-
SHA512
6d9eaf668c923ab1c47d12344101ea8bbdf1b58e2f8ee7e8b1507ee1cb41a7180ae82a1694f6c767d2367663b6a067e52082c3a6c3e75425649d71628668c838
-
SSDEEP
12288:lMr8y909BOCE20p1ySPN6n1xgi//sVrL3OLB03BDRN:ZygBOt1q0iHsVmi3pX
Static task
static1
Behavioral task
behavioral1
Sample
146ff8e0d2679bbc8243c03855e8838254d26868497f20866bc0e66681c942df.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
146ff8e0d2679bbc8243c03855e8838254d26868497f20866bc0e66681c942df
-
Size
521KB
-
MD5
82e1a4e5f1d566a730b983b48c832250
-
SHA1
e17430f25eb66271f563c757b0690c2ede462454
-
SHA256
146ff8e0d2679bbc8243c03855e8838254d26868497f20866bc0e66681c942df
-
SHA512
6d9eaf668c923ab1c47d12344101ea8bbdf1b58e2f8ee7e8b1507ee1cb41a7180ae82a1694f6c767d2367663b6a067e52082c3a6c3e75425649d71628668c838
-
SSDEEP
12288:lMr8y909BOCE20p1ySPN6n1xgi//sVrL3OLB03BDRN:ZygBOt1q0iHsVmi3pX
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1