General
-
Target
4c167d370d2872e257b946973def08e5af56e6cdf51b05f9fb8a0d5b5535d023
-
Size
672KB
-
Sample
241110-1nttysweqe
-
MD5
eab784c0a980106acd238109a46e4004
-
SHA1
54bd99a5a32304605220bb323e4a77d882b420ed
-
SHA256
4c167d370d2872e257b946973def08e5af56e6cdf51b05f9fb8a0d5b5535d023
-
SHA512
32cd888d6ba50a1b89b21e44ed5d78dcafac82ef55104cbe2a953354e0bfa67f356b0d550272a71d5350f7a3207c5d881b575f970a0974edf496bbd425b75df4
-
SSDEEP
12288:1MrLy90j/7Mw0x9HWWjkcNGCTBK1qpgZLQbGBomwZ+Yn51Ap024uY:iyS/SrWWYc4C01WwLQaBo2KYWHx
Static task
static1
Behavioral task
behavioral1
Sample
4c167d370d2872e257b946973def08e5af56e6cdf51b05f9fb8a0d5b5535d023.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
4c167d370d2872e257b946973def08e5af56e6cdf51b05f9fb8a0d5b5535d023
-
Size
672KB
-
MD5
eab784c0a980106acd238109a46e4004
-
SHA1
54bd99a5a32304605220bb323e4a77d882b420ed
-
SHA256
4c167d370d2872e257b946973def08e5af56e6cdf51b05f9fb8a0d5b5535d023
-
SHA512
32cd888d6ba50a1b89b21e44ed5d78dcafac82ef55104cbe2a953354e0bfa67f356b0d550272a71d5350f7a3207c5d881b575f970a0974edf496bbd425b75df4
-
SSDEEP
12288:1MrLy90j/7Mw0x9HWWjkcNGCTBK1qpgZLQbGBomwZ+Yn51Ap024uY:iyS/SrWWYc4C01WwLQaBo2KYWHx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1