General
-
Target
5d9b2dc0ffa9d901e104872649d7833b74003a5c095671abd9649dc0609bb53a
-
Size
666KB
-
Sample
241106-thjcpssmaw
-
MD5
35da149ca6182a0e8df20cf85377fcf3
-
SHA1
34693681cc5b9cd5271c744b4bfbbaf0a1f3446c
-
SHA256
5d9b2dc0ffa9d901e104872649d7833b74003a5c095671abd9649dc0609bb53a
-
SHA512
1048d270f48991ca7f816509f8e7a830e11fe220fb877dd61032779a1611fc3748a3780044006026821d802784461350d0cfc97b1e0a9137a2b9fb9f48e262aa
-
SSDEEP
12288:WMrry90T2fkZYq7xS8E/eOyHISOs0a9zU7VrUeKC/wtHWKEEce:5yVzq88hO4RODuY7VrucwJxEEce
Static task
static1
Behavioral task
behavioral1
Sample
5d9b2dc0ffa9d901e104872649d7833b74003a5c095671abd9649dc0609bb53a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
5d9b2dc0ffa9d901e104872649d7833b74003a5c095671abd9649dc0609bb53a
-
Size
666KB
-
MD5
35da149ca6182a0e8df20cf85377fcf3
-
SHA1
34693681cc5b9cd5271c744b4bfbbaf0a1f3446c
-
SHA256
5d9b2dc0ffa9d901e104872649d7833b74003a5c095671abd9649dc0609bb53a
-
SHA512
1048d270f48991ca7f816509f8e7a830e11fe220fb877dd61032779a1611fc3748a3780044006026821d802784461350d0cfc97b1e0a9137a2b9fb9f48e262aa
-
SSDEEP
12288:WMrry90T2fkZYq7xS8E/eOyHISOs0a9zU7VrUeKC/wtHWKEEce:5yVzq88hO4RODuY7VrucwJxEEce
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1