General
-
Target
0e803f7fd0524a42a16841b89d25bb1286d5b34a728855c42d2f1f820ff75745
-
Size
561KB
-
Sample
241106-td5edatama
-
MD5
d9e5e4afd92036e7bc2d4960c63abb0a
-
SHA1
11ea4f7cfa02cf3d6ed84a357f5968f67e8b5065
-
SHA256
0e803f7fd0524a42a16841b89d25bb1286d5b34a728855c42d2f1f820ff75745
-
SHA512
dcef955df741adae2500b642ff47c11cc98a5a30e6b1b3572bce7b15712b7a88c3c6337a5b770afaeb32e80e5621e96f519ee7a4c32e3a2e1331c6f1b47f0459
-
SSDEEP
12288:vMrLy90biSOzlzMhZ94mNBXPMyk11vBGWjGUpM0:wyAOzFeZKmNRE71vUWj5y0
Static task
static1
Behavioral task
behavioral1
Sample
0e803f7fd0524a42a16841b89d25bb1286d5b34a728855c42d2f1f820ff75745.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
0e803f7fd0524a42a16841b89d25bb1286d5b34a728855c42d2f1f820ff75745
-
Size
561KB
-
MD5
d9e5e4afd92036e7bc2d4960c63abb0a
-
SHA1
11ea4f7cfa02cf3d6ed84a357f5968f67e8b5065
-
SHA256
0e803f7fd0524a42a16841b89d25bb1286d5b34a728855c42d2f1f820ff75745
-
SHA512
dcef955df741adae2500b642ff47c11cc98a5a30e6b1b3572bce7b15712b7a88c3c6337a5b770afaeb32e80e5621e96f519ee7a4c32e3a2e1331c6f1b47f0459
-
SSDEEP
12288:vMrLy90biSOzlzMhZ94mNBXPMyk11vBGWjGUpM0:wyAOzFeZKmNRE71vUWj5y0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1