General
-
Target
a19b9a6484afca9db76dd760601fe54b3a3ccebc6e2d1e4e7de4f308375ddb7a
-
Size
536KB
-
Sample
241106-vtnx1athjf
-
MD5
63856081119f946080dd0c84623b228d
-
SHA1
fed140a65b1c591aeac0aba63107f684df4c6660
-
SHA256
a19b9a6484afca9db76dd760601fe54b3a3ccebc6e2d1e4e7de4f308375ddb7a
-
SHA512
d6dc02a972f7d126388199e2b6b31117de9e930b21331a33d413a44b85c85a011e4e76ef4ce76ee71e5c4d4d2e767a9cf5a5d03b9cd3ffce689c36762c988a1f
-
SSDEEP
12288:eMriy90e36Yeve0TLsw63yLotwUM5HjwruNMeViiv/5x+qEQay:YyEltL9wwHDw3Giiv//HE3y
Static task
static1
Behavioral task
behavioral1
Sample
a19b9a6484afca9db76dd760601fe54b3a3ccebc6e2d1e4e7de4f308375ddb7a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a19b9a6484afca9db76dd760601fe54b3a3ccebc6e2d1e4e7de4f308375ddb7a
-
Size
536KB
-
MD5
63856081119f946080dd0c84623b228d
-
SHA1
fed140a65b1c591aeac0aba63107f684df4c6660
-
SHA256
a19b9a6484afca9db76dd760601fe54b3a3ccebc6e2d1e4e7de4f308375ddb7a
-
SHA512
d6dc02a972f7d126388199e2b6b31117de9e930b21331a33d413a44b85c85a011e4e76ef4ce76ee71e5c4d4d2e767a9cf5a5d03b9cd3ffce689c36762c988a1f
-
SSDEEP
12288:eMriy90e36Yeve0TLsw63yLotwUM5HjwruNMeViiv/5x+qEQay:YyEltL9wwHDw3Giiv//HE3y
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1