General
-
Target
2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12
-
Size
671KB
-
Sample
241110-1nk7taypgp
-
MD5
7ee30a22d37cc0bb3d1d284826dcbac4
-
SHA1
ce3c3488a47f0fc098e7278467c3b5b1d4292cf0
-
SHA256
2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12
-
SHA512
901e0beb9e01fe4c92c9245cec46aed086bf34794578a205dd9e1be59488602e4adf614c5bef96839c3a603841406d634a6864e00242d788bb9636bd12fa5ee7
-
SSDEEP
12288:3MrKy9051HgEJiMOEHU+HXrqO0fgsD090L9ZbJKR/tfmcq3LqUo2rQIq8a:dyDWxOEHUuqO0fn0CpdJefmcq3GUpjqN
Static task
static1
Behavioral task
behavioral1
Sample
2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12
-
Size
671KB
-
MD5
7ee30a22d37cc0bb3d1d284826dcbac4
-
SHA1
ce3c3488a47f0fc098e7278467c3b5b1d4292cf0
-
SHA256
2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12
-
SHA512
901e0beb9e01fe4c92c9245cec46aed086bf34794578a205dd9e1be59488602e4adf614c5bef96839c3a603841406d634a6864e00242d788bb9636bd12fa5ee7
-
SSDEEP
12288:3MrKy9051HgEJiMOEHU+HXrqO0fgsD090L9ZbJKR/tfmcq3LqUo2rQIq8a:dyDWxOEHUuqO0fn0CpdJefmcq3GUpjqN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1