General
-
Target
42d1b2c9a98013539bac7aa2bbaf64e25e97fef6a033acaa5ccabb37d0381c8e
-
Size
561KB
-
Sample
241106-pa6qtazgpp
-
MD5
e1e2a2a9b3909f9ad12d9e45fd8cf3ba
-
SHA1
0fdad4e1483d6c68f0ee43ea10d384c0b8c5e6d7
-
SHA256
42d1b2c9a98013539bac7aa2bbaf64e25e97fef6a033acaa5ccabb37d0381c8e
-
SHA512
6968346c3f543377f7bd0819e440948add4fc7a84199ad9f526391ef09a2aa5a1b747fbde99f973802b13d078e853c8ba8ff43acf28a8f7113e77b37f2f3a683
-
SSDEEP
12288:NMr5y90CtWYqXsSqDJ4Ff2E3xJplIogvFCk7:My5UAiF+E3NlmFV
Static task
static1
Behavioral task
behavioral1
Sample
42d1b2c9a98013539bac7aa2bbaf64e25e97fef6a033acaa5ccabb37d0381c8e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
42d1b2c9a98013539bac7aa2bbaf64e25e97fef6a033acaa5ccabb37d0381c8e
-
Size
561KB
-
MD5
e1e2a2a9b3909f9ad12d9e45fd8cf3ba
-
SHA1
0fdad4e1483d6c68f0ee43ea10d384c0b8c5e6d7
-
SHA256
42d1b2c9a98013539bac7aa2bbaf64e25e97fef6a033acaa5ccabb37d0381c8e
-
SHA512
6968346c3f543377f7bd0819e440948add4fc7a84199ad9f526391ef09a2aa5a1b747fbde99f973802b13d078e853c8ba8ff43acf28a8f7113e77b37f2f3a683
-
SSDEEP
12288:NMr5y90CtWYqXsSqDJ4Ff2E3xJplIogvFCk7:My5UAiF+E3NlmFV
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1