General
-
Target
ac0739ccf686a61d2169bdfb33ab7fd46e23ac2d5cedab94c0253ef09489039c
-
Size
516KB
-
Sample
241111-a925cayhqc
-
MD5
82a0cbad24eb20e27f515f3ffd9cd8c0
-
SHA1
cd4a5a2551c19adf38e2ce362a8c7dae64cb173a
-
SHA256
ac0739ccf686a61d2169bdfb33ab7fd46e23ac2d5cedab94c0253ef09489039c
-
SHA512
d0912cf7cfb14d774dbffb43380d4425c776f128729c7b81157e3ddac877c19b438554db5a0bb2e2d2c7437cc98a73eab7bcbee8652c6d8936653c7d654238d0
-
SSDEEP
12288:rMrNy904HAWaL8i04nioHGukmy3W/Ptvi9cS:qyT3NcOmymntvi9R
Static task
static1
Behavioral task
behavioral1
Sample
ac0739ccf686a61d2169bdfb33ab7fd46e23ac2d5cedab94c0253ef09489039c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Targets
-
-
Target
ac0739ccf686a61d2169bdfb33ab7fd46e23ac2d5cedab94c0253ef09489039c
-
Size
516KB
-
MD5
82a0cbad24eb20e27f515f3ffd9cd8c0
-
SHA1
cd4a5a2551c19adf38e2ce362a8c7dae64cb173a
-
SHA256
ac0739ccf686a61d2169bdfb33ab7fd46e23ac2d5cedab94c0253ef09489039c
-
SHA512
d0912cf7cfb14d774dbffb43380d4425c776f128729c7b81157e3ddac877c19b438554db5a0bb2e2d2c7437cc98a73eab7bcbee8652c6d8936653c7d654238d0
-
SSDEEP
12288:rMrNy904HAWaL8i04nioHGukmy3W/Ptvi9cS:qyT3NcOmymntvi9R
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1