General
-
Target
2535a57915da267368b9dba6e60e0b84f3f2fbaa27c8de16d1a329199e7d78b7
-
Size
521KB
-
Sample
241111-b14r9azele
-
MD5
15043d3fdb28b84e2cd41d19581d22db
-
SHA1
04139ebacdc62abf5eac320afd453b1a1b8d6e91
-
SHA256
2535a57915da267368b9dba6e60e0b84f3f2fbaa27c8de16d1a329199e7d78b7
-
SHA512
42c4f0b9fa37739836a4b50347d954b1bf8d63de76990c78b5dcd19724a752dcdd9150be2f1dbb9f851ac6a9a0abd37c8754645ffd88751ff53c806f6c9a5b73
-
SSDEEP
12288:2Mr9y9083I74IkIR+qcURTYcuyZLk/bLgYOz:LyL3+4IvM5UBuyi/bLSz
Static task
static1
Behavioral task
behavioral1
Sample
2535a57915da267368b9dba6e60e0b84f3f2fbaa27c8de16d1a329199e7d78b7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
2535a57915da267368b9dba6e60e0b84f3f2fbaa27c8de16d1a329199e7d78b7
-
Size
521KB
-
MD5
15043d3fdb28b84e2cd41d19581d22db
-
SHA1
04139ebacdc62abf5eac320afd453b1a1b8d6e91
-
SHA256
2535a57915da267368b9dba6e60e0b84f3f2fbaa27c8de16d1a329199e7d78b7
-
SHA512
42c4f0b9fa37739836a4b50347d954b1bf8d63de76990c78b5dcd19724a752dcdd9150be2f1dbb9f851ac6a9a0abd37c8754645ffd88751ff53c806f6c9a5b73
-
SSDEEP
12288:2Mr9y9083I74IkIR+qcURTYcuyZLk/bLgYOz:LyL3+4IvM5UBuyi/bLSz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1