General
-
Target
d2775efdc0748f2416f27ef68a7559dc170c7614dae161e338e9f4331870c684
-
Size
1.0MB
-
Sample
241106-pz9h1a1ckn
-
MD5
42b1141bcef387de62b8b3057b0ed4d0
-
SHA1
7d9d83e1b3f9d1edf13f7d2a855d62bf15aab28d
-
SHA256
d2775efdc0748f2416f27ef68a7559dc170c7614dae161e338e9f4331870c684
-
SHA512
9594b4d733ee6210be68ee399dc7ae651052e68ffa6cf3ac9a4665cdedfdd02d030b14ca461d7cc47d86a211f32742014b3df430213451f975bfa967dd967f09
-
SSDEEP
24576:FyEOf2IGJx7ebHV3zLFMEknVOXhzdU3SPq/KEfvhlqAPjfNm:gEOOIAx6Bl0VildMKuvhlqkjf
Static task
static1
Behavioral task
behavioral1
Sample
d2775efdc0748f2416f27ef68a7559dc170c7614dae161e338e9f4331870c684.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d2775efdc0748f2416f27ef68a7559dc170c7614dae161e338e9f4331870c684
-
Size
1.0MB
-
MD5
42b1141bcef387de62b8b3057b0ed4d0
-
SHA1
7d9d83e1b3f9d1edf13f7d2a855d62bf15aab28d
-
SHA256
d2775efdc0748f2416f27ef68a7559dc170c7614dae161e338e9f4331870c684
-
SHA512
9594b4d733ee6210be68ee399dc7ae651052e68ffa6cf3ac9a4665cdedfdd02d030b14ca461d7cc47d86a211f32742014b3df430213451f975bfa967dd967f09
-
SSDEEP
24576:FyEOf2IGJx7ebHV3zLFMEknVOXhzdU3SPq/KEfvhlqAPjfNm:gEOOIAx6Bl0VildMKuvhlqkjf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1