General
-
Target
517842e4c7366844a4291ad7eb11ed29d01e3022caf31875e43e51c0112e2c08
-
Size
533KB
-
Sample
241111-ax4seaxqds
-
MD5
3757402c6657188b3086dce459e2b597
-
SHA1
f2d43ba234331a6142c175a813189b6523af109e
-
SHA256
517842e4c7366844a4291ad7eb11ed29d01e3022caf31875e43e51c0112e2c08
-
SHA512
925ef89adaaf3d1c2d90352f88416ece111720e5d74568ea11e2991b407797dec13ee89f3f9de39d712e938cb161a26a3c8d9ecf3d36f414f9198e2e2df1c991
-
SSDEEP
12288:YMr0y90DeUXlPTiXWvPN6BuP3LqTUzhPEKnaCMj7vz9pe:8yoXYXWvPN6UP3GwVsKnajr9A
Static task
static1
Behavioral task
behavioral1
Sample
517842e4c7366844a4291ad7eb11ed29d01e3022caf31875e43e51c0112e2c08.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
517842e4c7366844a4291ad7eb11ed29d01e3022caf31875e43e51c0112e2c08
-
Size
533KB
-
MD5
3757402c6657188b3086dce459e2b597
-
SHA1
f2d43ba234331a6142c175a813189b6523af109e
-
SHA256
517842e4c7366844a4291ad7eb11ed29d01e3022caf31875e43e51c0112e2c08
-
SHA512
925ef89adaaf3d1c2d90352f88416ece111720e5d74568ea11e2991b407797dec13ee89f3f9de39d712e938cb161a26a3c8d9ecf3d36f414f9198e2e2df1c991
-
SSDEEP
12288:YMr0y90DeUXlPTiXWvPN6BuP3LqTUzhPEKnaCMj7vz9pe:8yoXYXWvPN6UP3GwVsKnajr9A
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1