General
-
Target
d7f1f46625257fe1be2e153eaa6d23f32f41746294b8566df46f90a8bd0a4c3d
-
Size
976KB
-
Sample
241111-aarvbsxgnp
-
MD5
f5e8a2529d7ab4498e91cfbe7ab3902e
-
SHA1
6524010e349408773d2eef0242aa26587558e582
-
SHA256
d7f1f46625257fe1be2e153eaa6d23f32f41746294b8566df46f90a8bd0a4c3d
-
SHA512
e7065581f9f845105d6e90e0de6b8264e529c15b8ba5977fe2b58a18f55fc00da57e518136826e955b82d963481249dee44a1c0acaab49ffb8afaafe1102e1d7
-
SSDEEP
24576:RyLpJC59utwi4RnRI+Tq4Vp9X8aqMUnUEiNHP:Emytwi4RnPzB2MIm
Static task
static1
Behavioral task
behavioral1
Sample
d7f1f46625257fe1be2e153eaa6d23f32f41746294b8566df46f90a8bd0a4c3d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d7f1f46625257fe1be2e153eaa6d23f32f41746294b8566df46f90a8bd0a4c3d
-
Size
976KB
-
MD5
f5e8a2529d7ab4498e91cfbe7ab3902e
-
SHA1
6524010e349408773d2eef0242aa26587558e582
-
SHA256
d7f1f46625257fe1be2e153eaa6d23f32f41746294b8566df46f90a8bd0a4c3d
-
SHA512
e7065581f9f845105d6e90e0de6b8264e529c15b8ba5977fe2b58a18f55fc00da57e518136826e955b82d963481249dee44a1c0acaab49ffb8afaafe1102e1d7
-
SSDEEP
24576:RyLpJC59utwi4RnRI+Tq4Vp9X8aqMUnUEiNHP:Emytwi4RnPzB2MIm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1