General
-
Target
a445d7cf27e05d5bb253252e36af7616244a27125ddd02a849f56a832022dd71
-
Size
1011KB
-
Sample
241106-mjwk4a1khq
-
MD5
684458afeac6043c249d1436abdfbcaf
-
SHA1
c6a1d868e62ab892405cbe6cd5475b81be976997
-
SHA256
a445d7cf27e05d5bb253252e36af7616244a27125ddd02a849f56a832022dd71
-
SHA512
219a908a2f739752317b81c6b6b223cd77c5a13f77a2beebc802ef7d892dd9ebaddf6a2e9ce006f6479ca467cb158c80ded6c1387464537e5c7955515c21cf94
-
SSDEEP
24576:xyGoHHoK+KnkYhtQsX1I6cstS0uvSEmykfHGTc4jz:kGoHIK+H01ncsM0KS5yO+j
Static task
static1
Behavioral task
behavioral1
Sample
a445d7cf27e05d5bb253252e36af7616244a27125ddd02a849f56a832022dd71.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a445d7cf27e05d5bb253252e36af7616244a27125ddd02a849f56a832022dd71
-
Size
1011KB
-
MD5
684458afeac6043c249d1436abdfbcaf
-
SHA1
c6a1d868e62ab892405cbe6cd5475b81be976997
-
SHA256
a445d7cf27e05d5bb253252e36af7616244a27125ddd02a849f56a832022dd71
-
SHA512
219a908a2f739752317b81c6b6b223cd77c5a13f77a2beebc802ef7d892dd9ebaddf6a2e9ce006f6479ca467cb158c80ded6c1387464537e5c7955515c21cf94
-
SSDEEP
24576:xyGoHHoK+KnkYhtQsX1I6cstS0uvSEmykfHGTc4jz:kGoHIK+H01ncsM0KS5yO+j
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1