General
-
Target
121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5
-
Size
682KB
-
Sample
241106-mz1jzs1mfq
-
MD5
565bd7f600da882212dee93b68512c9d
-
SHA1
da45f3b132f50b20981f720558aad49e14194f1e
-
SHA256
121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5
-
SHA512
aba2c87876fef0ff83a69cea3bc3c559f9a5a80f32f428965ff634d82ea04dffce52b669d6e932cee0efffe0ef7464ff597fe61b462feb8b8dedb729601bb04e
-
SSDEEP
12288:cMrAy90pJsPeKxv9ohjzxTbrxO39xv/n7WMwCUUxZmhL3DY5P6/o:0yCJsPeKB9ohBTbrKtj+CU8mhLzY9F
Static task
static1
Behavioral task
behavioral1
Sample
121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5
-
Size
682KB
-
MD5
565bd7f600da882212dee93b68512c9d
-
SHA1
da45f3b132f50b20981f720558aad49e14194f1e
-
SHA256
121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5
-
SHA512
aba2c87876fef0ff83a69cea3bc3c559f9a5a80f32f428965ff634d82ea04dffce52b669d6e932cee0efffe0ef7464ff597fe61b462feb8b8dedb729601bb04e
-
SSDEEP
12288:cMrAy90pJsPeKxv9ohjzxTbrxO39xv/n7WMwCUUxZmhL3DY5P6/o:0yCJsPeKB9ohBTbrKtj+CU8mhLzY9F
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1