General
-
Target
eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab
-
Size
534KB
-
Sample
241106-nkgn1azalh
-
MD5
c42c7615772c474d964071a4c46a64b0
-
SHA1
f6f36f99b5ea815c0c90557bf4488dfa482b7052
-
SHA256
eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab
-
SHA512
34b124cb634c20ef5b8d1134970196db8347825d7732158bae0e99263528ea958e717c7d2609b291bc3896c452a4e777c5b929792784c36ec512fc1279b899fe
-
SSDEEP
12288:cMrAy90X8ZUQKhXp2ifZDG/G0wzhO5sj+fxWQy:kyu8ZUQGF0wVFj+5WQy
Static task
static1
Behavioral task
behavioral1
Sample
eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab
-
Size
534KB
-
MD5
c42c7615772c474d964071a4c46a64b0
-
SHA1
f6f36f99b5ea815c0c90557bf4488dfa482b7052
-
SHA256
eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab
-
SHA512
34b124cb634c20ef5b8d1134970196db8347825d7732158bae0e99263528ea958e717c7d2609b291bc3896c452a4e777c5b929792784c36ec512fc1279b899fe
-
SSDEEP
12288:cMrAy90X8ZUQKhXp2ifZDG/G0wzhO5sj+fxWQy:kyu8ZUQGF0wVFj+5WQy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1