General
-
Target
59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101
-
Size
537KB
-
Sample
241110-18zwpsxard
-
MD5
93a78c4a5f0d4775fbe11092367a5f67
-
SHA1
afca23f5a7b0440e3bfed3498878f13cc9748036
-
SHA256
59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101
-
SHA512
24798599ea0b0408c80fc812104f3366c5324dfca1529b76c4ddaca6c3cec6a12d8395acff674123a12e527183204dc45b921d42fb37e98f6a7ab293935c49ad
-
SSDEEP
12288:GMrcy90LmhCUbL6S5rULkHhwGPkyVbsY:2yDjrFBwGcMP
Static task
static1
Behavioral task
behavioral1
Sample
59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101
-
Size
537KB
-
MD5
93a78c4a5f0d4775fbe11092367a5f67
-
SHA1
afca23f5a7b0440e3bfed3498878f13cc9748036
-
SHA256
59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101
-
SHA512
24798599ea0b0408c80fc812104f3366c5324dfca1529b76c4ddaca6c3cec6a12d8395acff674123a12e527183204dc45b921d42fb37e98f6a7ab293935c49ad
-
SSDEEP
12288:GMrcy90LmhCUbL6S5rULkHhwGPkyVbsY:2yDjrFBwGcMP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1