General
-
Target
9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38
-
Size
530KB
-
Sample
241110-2ab8eswley
-
MD5
168b99a4a4a225fb1400856d8559581f
-
SHA1
39c84da1fa75ac3c818224e8e47c2da3604095b3
-
SHA256
9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38
-
SHA512
69f77ef3aaf50f13e9b683e823aa2356c3b77f5ca58f7aea1571978b7d8eceda4bb0df390e97145709a51d676abbb8359ea41e82554cc9282ac2eca26c79e533
-
SSDEEP
12288:IMr0y90PlRMjZXgWnX1zEXKnKJQQyqBM2HGYQwKFj2vouo:MyouXpXt4bmQRswKFqo
Static task
static1
Behavioral task
behavioral1
Sample
9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38
-
Size
530KB
-
MD5
168b99a4a4a225fb1400856d8559581f
-
SHA1
39c84da1fa75ac3c818224e8e47c2da3604095b3
-
SHA256
9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38
-
SHA512
69f77ef3aaf50f13e9b683e823aa2356c3b77f5ca58f7aea1571978b7d8eceda4bb0df390e97145709a51d676abbb8359ea41e82554cc9282ac2eca26c79e533
-
SSDEEP
12288:IMr0y90PlRMjZXgWnX1zEXKnKJQQyqBM2HGYQwKFj2vouo:MyouXpXt4bmQRswKFqo
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1