General
-
Target
4cdddd595182110e8f475de54b891af960bc01483477ab089b47204fd9fcb59b
-
Size
658KB
-
Sample
241111-b8hjzsyqay
-
MD5
c91f3c0bdb4f0f9b3c87911d1630ee51
-
SHA1
945a523116e9dc15eb85352a08dc45212cf6f770
-
SHA256
4cdddd595182110e8f475de54b891af960bc01483477ab089b47204fd9fcb59b
-
SHA512
f56e8ea70e922b84502436ebc06cb31f922f4dd5f4e3c420cb20faa4a63f7af551627376b7493e80b8c6dd2bebdf17d33e29fbbef952301482748b4ef93960fd
-
SSDEEP
12288:lMr0y90lXmI1W4fuogB+0P/tp4IBmTQ0L9xqm9uv:NywXjfuogB+0PFacmE0L9xe
Static task
static1
Behavioral task
behavioral1
Sample
4cdddd595182110e8f475de54b891af960bc01483477ab089b47204fd9fcb59b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
4cdddd595182110e8f475de54b891af960bc01483477ab089b47204fd9fcb59b
-
Size
658KB
-
MD5
c91f3c0bdb4f0f9b3c87911d1630ee51
-
SHA1
945a523116e9dc15eb85352a08dc45212cf6f770
-
SHA256
4cdddd595182110e8f475de54b891af960bc01483477ab089b47204fd9fcb59b
-
SHA512
f56e8ea70e922b84502436ebc06cb31f922f4dd5f4e3c420cb20faa4a63f7af551627376b7493e80b8c6dd2bebdf17d33e29fbbef952301482748b4ef93960fd
-
SSDEEP
12288:lMr0y90lXmI1W4fuogB+0P/tp4IBmTQ0L9xqm9uv:NywXjfuogB+0PFacmE0L9xe
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1