General
-
Target
a3089be20a36a67baf2d3e360f5e58739d78cd4518b5ce2c45b8e156c36a5b14
-
Size
658KB
-
Sample
241109-f44c4sydqr
-
MD5
5ca181814c2f8374d434f6cf98aa4c96
-
SHA1
ed8b8f2a47fbc952f3171529eccf78b21c5902d2
-
SHA256
a3089be20a36a67baf2d3e360f5e58739d78cd4518b5ce2c45b8e156c36a5b14
-
SHA512
38f26a2f2ceb72114adeff16e3cb88532480d53fcaa47f570f0d7b23faba8e9299e8b4e317ae75e6080b5ead0a714f7c675e68f72586926d3c7cdce0b3c5e8a3
-
SSDEEP
12288:TMr0y903P3plltt8wE1mPn+5Sde4LE1dmr4pN14+EJZxa/WnO96od1yVkz:Xyo3ftC1mmy/EqrQ14+EJzQVd1+kz
Static task
static1
Behavioral task
behavioral1
Sample
a3089be20a36a67baf2d3e360f5e58739d78cd4518b5ce2c45b8e156c36a5b14.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a3089be20a36a67baf2d3e360f5e58739d78cd4518b5ce2c45b8e156c36a5b14
-
Size
658KB
-
MD5
5ca181814c2f8374d434f6cf98aa4c96
-
SHA1
ed8b8f2a47fbc952f3171529eccf78b21c5902d2
-
SHA256
a3089be20a36a67baf2d3e360f5e58739d78cd4518b5ce2c45b8e156c36a5b14
-
SHA512
38f26a2f2ceb72114adeff16e3cb88532480d53fcaa47f570f0d7b23faba8e9299e8b4e317ae75e6080b5ead0a714f7c675e68f72586926d3c7cdce0b3c5e8a3
-
SSDEEP
12288:TMr0y903P3plltt8wE1mPn+5Sde4LE1dmr4pN14+EJZxa/WnO96od1yVkz:Xyo3ftC1mmy/EqrQ14+EJzQVd1+kz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1