General
-
Target
5b796031794cc0471fc2316105b3469408550a14b85c8ce740ee62919917d20b
-
Size
657KB
-
Sample
241106-npaq9azdqq
-
MD5
e3bf750c92b72ee912ab82a178f14bb7
-
SHA1
47d9aa79980cf9c7a00f8fa42ad7f789161e713f
-
SHA256
5b796031794cc0471fc2316105b3469408550a14b85c8ce740ee62919917d20b
-
SHA512
e6e76521796de8824863a7313dfc9ce85853f4a671d7106f067b82ca9da32412215cae0a466097173fc0b0bf4fdf241d49733ed690d0177f6621be6787659eb8
-
SSDEEP
12288:TMrhy90/WgEKV07CgCI3gLhZORibYep9Ye6xLbsjGDVHp4VlP71:eyPKCebxLRDkLbIeVJ4Vlx
Static task
static1
Behavioral task
behavioral1
Sample
5b796031794cc0471fc2316105b3469408550a14b85c8ce740ee62919917d20b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
5b796031794cc0471fc2316105b3469408550a14b85c8ce740ee62919917d20b
-
Size
657KB
-
MD5
e3bf750c92b72ee912ab82a178f14bb7
-
SHA1
47d9aa79980cf9c7a00f8fa42ad7f789161e713f
-
SHA256
5b796031794cc0471fc2316105b3469408550a14b85c8ce740ee62919917d20b
-
SHA512
e6e76521796de8824863a7313dfc9ce85853f4a671d7106f067b82ca9da32412215cae0a466097173fc0b0bf4fdf241d49733ed690d0177f6621be6787659eb8
-
SSDEEP
12288:TMrhy90/WgEKV07CgCI3gLhZORibYep9Ye6xLbsjGDVHp4VlP71:eyPKCebxLRDkLbIeVJ4Vlx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1