General
-
Target
00471d752ee524bd3cb3ee7abb78eebca7cd29fa3fd72f4d81ce185bfad50bde
-
Size
673KB
-
Sample
241106-t7v3ssteke
-
MD5
3872f4eaa1fd09f4866a20b054044f3c
-
SHA1
b7676e274e7a34bbbacd70685399afd5c7a34364
-
SHA256
00471d752ee524bd3cb3ee7abb78eebca7cd29fa3fd72f4d81ce185bfad50bde
-
SHA512
3684e4848490bd8341209c30b445e5bf9982bc3d03a956e3bdb0865ef22a0a646351c8c54dc9376a35e1e0e927f92db6c910eb8a568002050ea2ff663aca3a59
-
SSDEEP
12288:QMroy904lQDad6bGxz/yuRFZ2MpFksx3xcjhduWJqnHpq2Zt:oyTQeVxGuRFZ2C3ijfu2IFZt
Static task
static1
Behavioral task
behavioral1
Sample
00471d752ee524bd3cb3ee7abb78eebca7cd29fa3fd72f4d81ce185bfad50bde.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
00471d752ee524bd3cb3ee7abb78eebca7cd29fa3fd72f4d81ce185bfad50bde
-
Size
673KB
-
MD5
3872f4eaa1fd09f4866a20b054044f3c
-
SHA1
b7676e274e7a34bbbacd70685399afd5c7a34364
-
SHA256
00471d752ee524bd3cb3ee7abb78eebca7cd29fa3fd72f4d81ce185bfad50bde
-
SHA512
3684e4848490bd8341209c30b445e5bf9982bc3d03a956e3bdb0865ef22a0a646351c8c54dc9376a35e1e0e927f92db6c910eb8a568002050ea2ff663aca3a59
-
SSDEEP
12288:QMroy904lQDad6bGxz/yuRFZ2MpFksx3xcjhduWJqnHpq2Zt:oyTQeVxGuRFZ2C3ijfu2IFZt
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1