General
-
Target
758731262e1423c5449b17922f8b98bed16cbbfb94e3e1988533c947a7aa1984
-
Size
660KB
-
Sample
241110-3vsxcaxkgs
-
MD5
f43d3f25ce3cb843c3e9b7810abcaab8
-
SHA1
c9550fd2b5fc8652753912c0a81a221750b018f3
-
SHA256
758731262e1423c5449b17922f8b98bed16cbbfb94e3e1988533c947a7aa1984
-
SHA512
aabe71668e591d5afe6e8bc38b85d9255f81dd21412df04055aa94ff220e1f420e1322d2840714a50a3820dc17d5d4fc9632c583e5154ed1a5cf6fa508598f69
-
SSDEEP
12288:sMrGy90DpcV0kcaWilU4tl8hiLpPAiQ5IzLZ6HG90fs4rLi3iwaWPxA0Y:qycE0zBijIiLp5Q5IzN6m9Gs463iw5q
Static task
static1
Behavioral task
behavioral1
Sample
758731262e1423c5449b17922f8b98bed16cbbfb94e3e1988533c947a7aa1984.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
758731262e1423c5449b17922f8b98bed16cbbfb94e3e1988533c947a7aa1984
-
Size
660KB
-
MD5
f43d3f25ce3cb843c3e9b7810abcaab8
-
SHA1
c9550fd2b5fc8652753912c0a81a221750b018f3
-
SHA256
758731262e1423c5449b17922f8b98bed16cbbfb94e3e1988533c947a7aa1984
-
SHA512
aabe71668e591d5afe6e8bc38b85d9255f81dd21412df04055aa94ff220e1f420e1322d2840714a50a3820dc17d5d4fc9632c583e5154ed1a5cf6fa508598f69
-
SSDEEP
12288:sMrGy90DpcV0kcaWilU4tl8hiLpPAiQ5IzLZ6HG90fs4rLi3iwaWPxA0Y:qycE0zBijIiLp5Q5IzN6m9Gs463iw5q
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1