General
-
Target
501c37190eea6726ec02efaff84269a1af838c6fced1089f361a01be386ded70
-
Size
521KB
-
Sample
241106-pmmtga1all
-
MD5
90782a3f887582202f3418c5a60a2c70
-
SHA1
3fb7420d78dfed9819dbd98527a3130a206ae937
-
SHA256
501c37190eea6726ec02efaff84269a1af838c6fced1089f361a01be386ded70
-
SHA512
cdfa2705b46f27ddb86ff89c1222d4e72c9e2f193e48ef95ba8acc8c34d729bea64cfb1563d208f48926d59f2129fd343525e67cccfddb310035ca4cb521883a
-
SSDEEP
12288:tMrsy90Bi8USGftu6pS3EF3itvZsfrLiCAJfESqemT:ByTSGFu643Jthsf6CARE5e2
Static task
static1
Behavioral task
behavioral1
Sample
501c37190eea6726ec02efaff84269a1af838c6fced1089f361a01be386ded70.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
501c37190eea6726ec02efaff84269a1af838c6fced1089f361a01be386ded70
-
Size
521KB
-
MD5
90782a3f887582202f3418c5a60a2c70
-
SHA1
3fb7420d78dfed9819dbd98527a3130a206ae937
-
SHA256
501c37190eea6726ec02efaff84269a1af838c6fced1089f361a01be386ded70
-
SHA512
cdfa2705b46f27ddb86ff89c1222d4e72c9e2f193e48ef95ba8acc8c34d729bea64cfb1563d208f48926d59f2129fd343525e67cccfddb310035ca4cb521883a
-
SSDEEP
12288:tMrsy90Bi8USGftu6pS3EF3itvZsfrLiCAJfESqemT:ByTSGFu643Jthsf6CARE5e2
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1