General
-
Target
a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02
-
Size
537KB
-
Sample
241106-njbrcs1qfl
-
MD5
9db2701211a9182af85bb3008541c488
-
SHA1
d2157c97b37f3d02f1356277c96fcac1fa76353b
-
SHA256
a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02
-
SHA512
eb5e9a2292a4db12aa8d284851d30bccc986b5084d894a2fa8a70062142d6f58cf2a8bf4217ba726057915c5f421306550f92e02fd8d489d206dd06475c1e53b
-
SSDEEP
12288:XMrky90pHABwB9GHxsDkIE5dHiPrU92HPwPcIT67UAYV0:7yyoT3CPrDvwEOAUAK0
Static task
static1
Behavioral task
behavioral1
Sample
a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02
-
Size
537KB
-
MD5
9db2701211a9182af85bb3008541c488
-
SHA1
d2157c97b37f3d02f1356277c96fcac1fa76353b
-
SHA256
a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02
-
SHA512
eb5e9a2292a4db12aa8d284851d30bccc986b5084d894a2fa8a70062142d6f58cf2a8bf4217ba726057915c5f421306550f92e02fd8d489d206dd06475c1e53b
-
SSDEEP
12288:XMrky90pHABwB9GHxsDkIE5dHiPrU92HPwPcIT67UAYV0:7yyoT3CPrDvwEOAUAK0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1