General
-
Target
269a78294101405b789cabeca7b3d2b90b989ef1bb3f1b59b03f345b606aecc4
-
Size
671KB
-
Sample
241106-mj16ksydja
-
MD5
c4dc8976463a6f8cf21100ae542f0581
-
SHA1
30d435bc1c553751e04ba381f2b456289918f386
-
SHA256
269a78294101405b789cabeca7b3d2b90b989ef1bb3f1b59b03f345b606aecc4
-
SHA512
1ad015feafaacc9718ac6a642ebfd1ce5be98fc8c104590fff4392847d4c2dd14f4dc3f87e3e49058900b3bacf2bddc30604338fdb973f9b34ddee29cf6faa81
-
SSDEEP
12288:gMrey90Ivyds+YPqQFyxcZ5H88mjozX9SV7rv4cuCNH6ft/juAXwh2ul:uyHvisXEq5clUj9SVH/NaBjAh2ul
Static task
static1
Behavioral task
behavioral1
Sample
269a78294101405b789cabeca7b3d2b90b989ef1bb3f1b59b03f345b606aecc4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
269a78294101405b789cabeca7b3d2b90b989ef1bb3f1b59b03f345b606aecc4
-
Size
671KB
-
MD5
c4dc8976463a6f8cf21100ae542f0581
-
SHA1
30d435bc1c553751e04ba381f2b456289918f386
-
SHA256
269a78294101405b789cabeca7b3d2b90b989ef1bb3f1b59b03f345b606aecc4
-
SHA512
1ad015feafaacc9718ac6a642ebfd1ce5be98fc8c104590fff4392847d4c2dd14f4dc3f87e3e49058900b3bacf2bddc30604338fdb973f9b34ddee29cf6faa81
-
SSDEEP
12288:gMrey90Ivyds+YPqQFyxcZ5H88mjozX9SV7rv4cuCNH6ft/juAXwh2ul:uyHvisXEq5clUj9SVH/NaBjAh2ul
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1