General
-
Target
a9258bc48dfe602fd05d9b757411cd9cc624f765263fd703140d7d879828ed5c
-
Size
674KB
-
Sample
241106-n2xrjszcng
-
MD5
340ad9c2fc18a56df6c246d89510b115
-
SHA1
4088d06c3c52037945617a940adf3445e92aac83
-
SHA256
a9258bc48dfe602fd05d9b757411cd9cc624f765263fd703140d7d879828ed5c
-
SHA512
a26eabffe546d727b16c3dd9c43bd5a4086c634c932fe6c15310c9d51302b7feb9f0b7593c6d69ed8f836f733c215f5b91fed991ae9a34eb8d7acf83ebeed436
-
SSDEEP
12288:ZMroy90f/vw27bQdvaqc2vsIY1VcrPXQ4Q51GW/achnt3ainI:hyk/vtnWv0VVwPyjp/xhRaWI
Static task
static1
Behavioral task
behavioral1
Sample
a9258bc48dfe602fd05d9b757411cd9cc624f765263fd703140d7d879828ed5c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a9258bc48dfe602fd05d9b757411cd9cc624f765263fd703140d7d879828ed5c
-
Size
674KB
-
MD5
340ad9c2fc18a56df6c246d89510b115
-
SHA1
4088d06c3c52037945617a940adf3445e92aac83
-
SHA256
a9258bc48dfe602fd05d9b757411cd9cc624f765263fd703140d7d879828ed5c
-
SHA512
a26eabffe546d727b16c3dd9c43bd5a4086c634c932fe6c15310c9d51302b7feb9f0b7593c6d69ed8f836f733c215f5b91fed991ae9a34eb8d7acf83ebeed436
-
SSDEEP
12288:ZMroy90f/vw27bQdvaqc2vsIY1VcrPXQ4Q51GW/achnt3ainI:hyk/vtnWv0VVwPyjp/xhRaWI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1