General
-
Target
74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71
-
Size
673KB
-
Sample
241110-zy79navkhv
-
MD5
2ca5ef90d7f03feaa362389fd6a570cb
-
SHA1
f5c62870b88cc71019ee0bbbb9f2630311bdab3f
-
SHA256
74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71
-
SHA512
97471ff0b6ac412deb8ceefeb05dc10d28cd1a7c5b449da32a68b3474801b90523f51ce44c1336436c00fc669ce449350f55712ffa4f6a24f2a4282120be10c1
-
SSDEEP
12288:EMr7y90mz8xC7zmsX/pU+uST42MnFhws02mG4xuWGOKxIh8LF:XyrGCJBtuST424mGmu90Gx
Static task
static1
Behavioral task
behavioral1
Sample
74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71
-
Size
673KB
-
MD5
2ca5ef90d7f03feaa362389fd6a570cb
-
SHA1
f5c62870b88cc71019ee0bbbb9f2630311bdab3f
-
SHA256
74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71
-
SHA512
97471ff0b6ac412deb8ceefeb05dc10d28cd1a7c5b449da32a68b3474801b90523f51ce44c1336436c00fc669ce449350f55712ffa4f6a24f2a4282120be10c1
-
SSDEEP
12288:EMr7y90mz8xC7zmsX/pU+uST42MnFhws02mG4xuWGOKxIh8LF:XyrGCJBtuST424mGmu90Gx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1