General
-
Target
14bcd4a9a38bd4224e104e21d42c91cadaa3bb4732a0dc8eb9bedd5ca6924f67
-
Size
673KB
-
Sample
241106-vhtdcatfna
-
MD5
fddb23fc6942043c384e305a48a2f977
-
SHA1
f9cd0c34072bc146982754bb6a7e52b590a3f733
-
SHA256
14bcd4a9a38bd4224e104e21d42c91cadaa3bb4732a0dc8eb9bedd5ca6924f67
-
SHA512
5cc381a62434050712a84b5150a98467155fcfed506bb753b3e0b0bbc4f1b1e158ae62474d50199d00dd7bfe0c5e73ba1db0dd5468e520f59929ff1cf3c22d5b
-
SSDEEP
12288:CMrqy90SEkxE7+JQ4ZQFpuG2MIFh6Q0FzMisuWzMxFEviMP:Eys36WuG28BzMBuA+EvdP
Static task
static1
Behavioral task
behavioral1
Sample
14bcd4a9a38bd4224e104e21d42c91cadaa3bb4732a0dc8eb9bedd5ca6924f67.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
14bcd4a9a38bd4224e104e21d42c91cadaa3bb4732a0dc8eb9bedd5ca6924f67
-
Size
673KB
-
MD5
fddb23fc6942043c384e305a48a2f977
-
SHA1
f9cd0c34072bc146982754bb6a7e52b590a3f733
-
SHA256
14bcd4a9a38bd4224e104e21d42c91cadaa3bb4732a0dc8eb9bedd5ca6924f67
-
SHA512
5cc381a62434050712a84b5150a98467155fcfed506bb753b3e0b0bbc4f1b1e158ae62474d50199d00dd7bfe0c5e73ba1db0dd5468e520f59929ff1cf3c22d5b
-
SSDEEP
12288:CMrqy90SEkxE7+JQ4ZQFpuG2MIFh6Q0FzMisuWzMxFEviMP:Eys36WuG28BzMBuA+EvdP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1