General
-
Target
f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8
-
Size
690KB
-
Sample
241111-ar2e4a1qal
-
MD5
d9832350036785cf543f3ad73201a67f
-
SHA1
419c5941f440bb1ff40ecaacebccae3c22bc3ff3
-
SHA256
f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8
-
SHA512
97d2c8b82787f0cb912d44532e7c4771948e8038be8b72ce2eaa091fa273f28589c954d26bd9bbd815bd42e31e57b5e4fdcfc6aea47fe9197035b476557c825f
-
SSDEEP
12288:2MrRy9074n+fdOha/9sBUI1NO4H2KcsMJmPAa3XRMt8MX8gdvoWh:jyo4BhzN/OsfZpSmMMWvoWh
Static task
static1
Behavioral task
behavioral1
Sample
f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8
-
Size
690KB
-
MD5
d9832350036785cf543f3ad73201a67f
-
SHA1
419c5941f440bb1ff40ecaacebccae3c22bc3ff3
-
SHA256
f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8
-
SHA512
97d2c8b82787f0cb912d44532e7c4771948e8038be8b72ce2eaa091fa273f28589c954d26bd9bbd815bd42e31e57b5e4fdcfc6aea47fe9197035b476557c825f
-
SSDEEP
12288:2MrRy9074n+fdOha/9sBUI1NO4H2KcsMJmPAa3XRMt8MX8gdvoWh:jyo4BhzN/OsfZpSmMMWvoWh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1