General
-
Target
01e25bd900e4826f9e51f3962364161d4b22fcec6c4d1924b441a0f319be3a69
-
Size
560KB
-
Sample
241106-nj6xha1qgm
-
MD5
64f945bd3252fa8be2e8a9442c5083fc
-
SHA1
5dc0e25ff3bad48c05ec088fb606b72fea1f4a24
-
SHA256
01e25bd900e4826f9e51f3962364161d4b22fcec6c4d1924b441a0f319be3a69
-
SHA512
7a021a0b786998390655634ca84b7596aca43ab8e85fe3eb79ec1d73f0ee2c23d2d9e168fea4cc6418b3a1177f9837bce34fcd6b8e3c09d3fdc5fcaf1e2d82f7
-
SSDEEP
12288:qMryy90g/Gr48AlcdSePgZ1PPMLBfUR9hG3jefyr:Eyt/c48ld3PgZGxUR9hGzh
Static task
static1
Behavioral task
behavioral1
Sample
01e25bd900e4826f9e51f3962364161d4b22fcec6c4d1924b441a0f319be3a69.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
01e25bd900e4826f9e51f3962364161d4b22fcec6c4d1924b441a0f319be3a69
-
Size
560KB
-
MD5
64f945bd3252fa8be2e8a9442c5083fc
-
SHA1
5dc0e25ff3bad48c05ec088fb606b72fea1f4a24
-
SHA256
01e25bd900e4826f9e51f3962364161d4b22fcec6c4d1924b441a0f319be3a69
-
SHA512
7a021a0b786998390655634ca84b7596aca43ab8e85fe3eb79ec1d73f0ee2c23d2d9e168fea4cc6418b3a1177f9837bce34fcd6b8e3c09d3fdc5fcaf1e2d82f7
-
SSDEEP
12288:qMryy90g/Gr48AlcdSePgZ1PPMLBfUR9hG3jefyr:Eyt/c48ld3PgZGxUR9hGzh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1