General
-
Target
184ab14332b39ab23c91d67e54e1a5c146c1431a19b2f436a89987810061af96.exe
-
Size
689KB
-
Sample
241110-3txh5sxkez
-
MD5
475473ab8c7f5a89e9225c37d0522e80
-
SHA1
a8f5a6cb3b54d5564ff271c06e07e97a492006d8
-
SHA256
184ab14332b39ab23c91d67e54e1a5c146c1431a19b2f436a89987810061af96
-
SHA512
ca45109b6070a5de40d293af12dd3f27188a95448a5c7a657a869b36ba1925ab78c333a9b7670cabcad6950d28186d7046663bdf98631962cb2e43cd748f772c
-
SSDEEP
12288:hMrAy90CXNKVTyTk9vf1SGMBR25YAsEZEFxJHEpcImI+S8I:hy/XMVTDvfk9BR2TZEFgprEFI
Static task
static1
Behavioral task
behavioral1
Sample
184ab14332b39ab23c91d67e54e1a5c146c1431a19b2f436a89987810061af96.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
184ab14332b39ab23c91d67e54e1a5c146c1431a19b2f436a89987810061af96.exe
-
Size
689KB
-
MD5
475473ab8c7f5a89e9225c37d0522e80
-
SHA1
a8f5a6cb3b54d5564ff271c06e07e97a492006d8
-
SHA256
184ab14332b39ab23c91d67e54e1a5c146c1431a19b2f436a89987810061af96
-
SHA512
ca45109b6070a5de40d293af12dd3f27188a95448a5c7a657a869b36ba1925ab78c333a9b7670cabcad6950d28186d7046663bdf98631962cb2e43cd748f772c
-
SSDEEP
12288:hMrAy90CXNKVTyTk9vf1SGMBR25YAsEZEFxJHEpcImI+S8I:hy/XMVTDvfk9BR2TZEFgprEFI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1