General
-
Target
45c2daf2f72b68c8effaf7f0f2d77e20da4bcae2f491094878e1f0e83fa9be87
-
Size
666KB
-
Sample
241110-3jxfdsxdpm
-
MD5
9def15ff71797e7d28ee203d9fa1a1c1
-
SHA1
769cd1a170fec91d786ba750a8cf5ded27e0794d
-
SHA256
45c2daf2f72b68c8effaf7f0f2d77e20da4bcae2f491094878e1f0e83fa9be87
-
SHA512
3a2bf94c47e2198b86c6cde20919c31d09840b278001bdeb63e1e0018d713392bf29bd9dc7f80d447aaaed08c39cdb8413b88b624addb7d883af98ada93704e7
-
SSDEEP
12288:9Mrmy90y5nZbgxB8TE7bjo2/2vG22VsZcrbK5IrUUFM/wxwJl2CHcCbTxdb1:Xy3zbPgbv/2vG226ZobGIrjKwuPNHcCB
Static task
static1
Behavioral task
behavioral1
Sample
45c2daf2f72b68c8effaf7f0f2d77e20da4bcae2f491094878e1f0e83fa9be87.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
45c2daf2f72b68c8effaf7f0f2d77e20da4bcae2f491094878e1f0e83fa9be87
-
Size
666KB
-
MD5
9def15ff71797e7d28ee203d9fa1a1c1
-
SHA1
769cd1a170fec91d786ba750a8cf5ded27e0794d
-
SHA256
45c2daf2f72b68c8effaf7f0f2d77e20da4bcae2f491094878e1f0e83fa9be87
-
SHA512
3a2bf94c47e2198b86c6cde20919c31d09840b278001bdeb63e1e0018d713392bf29bd9dc7f80d447aaaed08c39cdb8413b88b624addb7d883af98ada93704e7
-
SSDEEP
12288:9Mrmy90y5nZbgxB8TE7bjo2/2vG22VsZcrbK5IrUUFM/wxwJl2CHcCbTxdb1:Xy3zbPgbv/2vG226ZobGIrjKwuPNHcCB
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1