General
-
Target
02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8
-
Size
522KB
-
Sample
241106-mzhdeazann
-
MD5
63679ec16eaf67c3f955f377eeec72c5
-
SHA1
d10b999f4b7c20e174248a1802bcc8eb7a5acaba
-
SHA256
02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8
-
SHA512
69742d2d56f3796b00397c02e9d8d8a7c8a5a678b255920f69316be330bcd9c58f7d92ff47080f2a4b48f778d45784ce498f61ff53ac37eb90f77657ac75e409
-
SSDEEP
12288:BMr7y90u4IKiurRAxhmmQAJ32bkMfaa7:SyGD6xcNAJ32bkMyS
Static task
static1
Behavioral task
behavioral1
Sample
02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8
-
Size
522KB
-
MD5
63679ec16eaf67c3f955f377eeec72c5
-
SHA1
d10b999f4b7c20e174248a1802bcc8eb7a5acaba
-
SHA256
02f879e15a5cfab05ce84e45aa336ea533a1bd00974c6937395e601a6805cda8
-
SHA512
69742d2d56f3796b00397c02e9d8d8a7c8a5a678b255920f69316be330bcd9c58f7d92ff47080f2a4b48f778d45784ce498f61ff53ac37eb90f77657ac75e409
-
SSDEEP
12288:BMr7y90u4IKiurRAxhmmQAJ32bkMfaa7:SyGD6xcNAJ32bkMyS
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1