General
-
Target
1fd1256b03c8bc19392483df57f3992b75050c855ecfb688604ddcfb4e23d8ce
-
Size
671KB
-
Sample
241106-v4lwdsvfjm
-
MD5
b0eb4804a1d98a58e92ff177632393b6
-
SHA1
c0190821f021469f222fb05fab821e1335c251cf
-
SHA256
1fd1256b03c8bc19392483df57f3992b75050c855ecfb688604ddcfb4e23d8ce
-
SHA512
09830d43f1f359dee7940679930d7d15c5df29661c47bdc195d897a6efa418274570a5d7f2a1e0cb06191c394741ab9e72e62eb8ec64bbffdd8830829558349b
-
SSDEEP
12288:gMrPy90R2ZreLuTiavAxFMOvIeVp2wq2FcuCFnXft/juxs/:/ye2ZCLuTeFLd4I6/FXB8s/
Static task
static1
Behavioral task
behavioral1
Sample
1fd1256b03c8bc19392483df57f3992b75050c855ecfb688604ddcfb4e23d8ce.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
1fd1256b03c8bc19392483df57f3992b75050c855ecfb688604ddcfb4e23d8ce
-
Size
671KB
-
MD5
b0eb4804a1d98a58e92ff177632393b6
-
SHA1
c0190821f021469f222fb05fab821e1335c251cf
-
SHA256
1fd1256b03c8bc19392483df57f3992b75050c855ecfb688604ddcfb4e23d8ce
-
SHA512
09830d43f1f359dee7940679930d7d15c5df29661c47bdc195d897a6efa418274570a5d7f2a1e0cb06191c394741ab9e72e62eb8ec64bbffdd8830829558349b
-
SSDEEP
12288:gMrPy90R2ZreLuTiavAxFMOvIeVp2wq2FcuCFnXft/juxs/:/ye2ZCLuTeFLd4I6/FXB8s/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1