General
-
Target
0525f0f4589b5fc5ac192ef32f52d10210479e4bdd9445f16523bad93fb82575
-
Size
1.2MB
-
Sample
241110-2ajmhawle1
-
MD5
e415ce829f3a2df1ff4c528d865fe5e4
-
SHA1
8da626a01e944fea31dabf933b200bc47934f96d
-
SHA256
0525f0f4589b5fc5ac192ef32f52d10210479e4bdd9445f16523bad93fb82575
-
SHA512
019a6afe7247ddb786b59432521a05115c87202f542e02059ae237a77edbdef4b7beaba7aa41d3d737e8f03405e575b34c335556d20b7cf8d14fbe628ea68bed
-
SSDEEP
24576:uI0emCdJyOOHgBV2kmESIaLxukkvE+XZ5yB5UZW8xkXdUapLhe:u9eLJyOsq9drX3yBWWJdU
Static task
static1
Behavioral task
behavioral1
Sample
0525f0f4589b5fc5ac192ef32f52d10210479e4bdd9445f16523bad93fb82575.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0525f0f4589b5fc5ac192ef32f52d10210479e4bdd9445f16523bad93fb82575.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
0525f0f4589b5fc5ac192ef32f52d10210479e4bdd9445f16523bad93fb82575
-
Size
1.2MB
-
MD5
e415ce829f3a2df1ff4c528d865fe5e4
-
SHA1
8da626a01e944fea31dabf933b200bc47934f96d
-
SHA256
0525f0f4589b5fc5ac192ef32f52d10210479e4bdd9445f16523bad93fb82575
-
SHA512
019a6afe7247ddb786b59432521a05115c87202f542e02059ae237a77edbdef4b7beaba7aa41d3d737e8f03405e575b34c335556d20b7cf8d14fbe628ea68bed
-
SSDEEP
24576:uI0emCdJyOOHgBV2kmESIaLxukkvE+XZ5yB5UZW8xkXdUapLhe:u9eLJyOsq9drX3yBWWJdU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1