General
-
Target
4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c
-
Size
538KB
-
Sample
241106-scea5asgpr
-
MD5
8fa7547b35260ca0c377cba55c334a20
-
SHA1
7dca0c0d42eb0b4f2541801ccb0db4cd1bb5bf4c
-
SHA256
4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c
-
SHA512
9a1a226a3855d5903377a9e910a05b4117993b04802b33ed32e947cfde6f66c6162759a22217ef97d2227b704bce8db4241b71047c24c3084f4f03b1873da7ed
-
SSDEEP
12288:eMrLy901MlCrPLlWIaTfivvKjeJ/QNBkFZXht:Ry2uCUIa7AJINmXb
Static task
static1
Behavioral task
behavioral1
Sample
4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c
-
Size
538KB
-
MD5
8fa7547b35260ca0c377cba55c334a20
-
SHA1
7dca0c0d42eb0b4f2541801ccb0db4cd1bb5bf4c
-
SHA256
4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c
-
SHA512
9a1a226a3855d5903377a9e910a05b4117993b04802b33ed32e947cfde6f66c6162759a22217ef97d2227b704bce8db4241b71047c24c3084f4f03b1873da7ed
-
SSDEEP
12288:eMrLy901MlCrPLlWIaTfivvKjeJ/QNBkFZXht:Ry2uCUIa7AJINmXb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1