General
-
Target
225966d0f3ee67e1439bf18a75144e1caf88b4c08730cbe8ce5e61d81930b2a0
-
Size
492KB
-
Sample
241110-1yzsyswdpn
-
MD5
9937a4577e0cf1ba4231706d293c5954
-
SHA1
05db86db946bd0ccf2e0cf6ecd59e0cf4e0a6241
-
SHA256
225966d0f3ee67e1439bf18a75144e1caf88b4c08730cbe8ce5e61d81930b2a0
-
SHA512
fb68389ce8c6c1ab3e40461a25b53f172529a58ce817cda08b72af778196d3730aff9e9afe85e67e543578a49c3f2901b35f731a002c4c87b0acab7ccd13e5ba
-
SSDEEP
12288:hLtGnjMv+M0uPGxSkIc9tWbwRWoeBF5CjNAtVuXCYfmbL:JtGnAv+z0GxrX9tWb8Wo0FYjNAtYyYfa
Static task
static1
Behavioral task
behavioral1
Sample
3a4ce9fa246924bc049d37e077d35874ea6806845a0cb512139df90a1bbe0562.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
3a4ce9fa246924bc049d37e077d35874ea6806845a0cb512139df90a1bbe0562.exe
-
Size
535KB
-
MD5
57fec1386f335f711eb261a273860385
-
SHA1
edea4c56a72197822e9048a5a8142272f1710854
-
SHA256
3a4ce9fa246924bc049d37e077d35874ea6806845a0cb512139df90a1bbe0562
-
SHA512
603baad7f1472b2e3d68f275eaf43470200021a6d609e6c7f35351014156ce876c3aa7b86fc5bf44af42dc67357c1aef236436ce386a66d1d28da3b0ff145f9c
-
SSDEEP
12288:+Mrcy90EEojf44o9rWfr/xK7C0G0ZeztpytYqJyBN+tG+j:2yDRs/wxfkuw7JJ7j
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1