General
-
Target
02c3d424b91104df718e25d3854119c3bc8b4ba55b5b4aaad0edf4900b16582c
-
Size
536KB
-
Sample
241106-va2pratepg
-
MD5
8e1a4983e9494c24f63621924669cdaa
-
SHA1
a2bb16694386ab8fa545103c96684b21b66e6aca
-
SHA256
02c3d424b91104df718e25d3854119c3bc8b4ba55b5b4aaad0edf4900b16582c
-
SHA512
2af74fe4e7cf487972ff4160d1d654d30fb43247ae17a4320bc42749f08d65042581fbe84e634acf4ab697e1ebd05911ddbae162eb931003720c4b05acd27725
-
SSDEEP
12288:YMrxy90USrWIH0aVlpwGzMNYzhMo8LEi7:JyKt5ANY/8wi7
Static task
static1
Behavioral task
behavioral1
Sample
02c3d424b91104df718e25d3854119c3bc8b4ba55b5b4aaad0edf4900b16582c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
02c3d424b91104df718e25d3854119c3bc8b4ba55b5b4aaad0edf4900b16582c
-
Size
536KB
-
MD5
8e1a4983e9494c24f63621924669cdaa
-
SHA1
a2bb16694386ab8fa545103c96684b21b66e6aca
-
SHA256
02c3d424b91104df718e25d3854119c3bc8b4ba55b5b4aaad0edf4900b16582c
-
SHA512
2af74fe4e7cf487972ff4160d1d654d30fb43247ae17a4320bc42749f08d65042581fbe84e634acf4ab697e1ebd05911ddbae162eb931003720c4b05acd27725
-
SSDEEP
12288:YMrxy90USrWIH0aVlpwGzMNYzhMo8LEi7:JyKt5ANY/8wi7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1