General
-
Target
7552f1873170c14992a93acd3e7a04a7990388312a4a83b881254d8d3428a915
-
Size
533KB
-
Sample
241111-cerfgatjfr
-
MD5
1fc75c3c2524cd88867637c40efae0fe
-
SHA1
3ccbd5696102cc8554ec286acbc7d70b829ea34c
-
SHA256
7552f1873170c14992a93acd3e7a04a7990388312a4a83b881254d8d3428a915
-
SHA512
2d230ea5cea02b3623ee0ab526536a77fcae69bd84e343339daabc2dae16cb20971639eed93e3bc2686ba91c611c91bdf11fc83f567675dbd4e893f7b8524c7e
-
SSDEEP
12288:iMr2y90Vd4LF5xzv+HmpK86UC13Lq/5rNcsqC4+v:4yP9zv+Gpt6H13G/MsqCz
Static task
static1
Behavioral task
behavioral1
Sample
7552f1873170c14992a93acd3e7a04a7990388312a4a83b881254d8d3428a915.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
7552f1873170c14992a93acd3e7a04a7990388312a4a83b881254d8d3428a915
-
Size
533KB
-
MD5
1fc75c3c2524cd88867637c40efae0fe
-
SHA1
3ccbd5696102cc8554ec286acbc7d70b829ea34c
-
SHA256
7552f1873170c14992a93acd3e7a04a7990388312a4a83b881254d8d3428a915
-
SHA512
2d230ea5cea02b3623ee0ab526536a77fcae69bd84e343339daabc2dae16cb20971639eed93e3bc2686ba91c611c91bdf11fc83f567675dbd4e893f7b8524c7e
-
SSDEEP
12288:iMr2y90Vd4LF5xzv+HmpK86UC13Lq/5rNcsqC4+v:4yP9zv+Gpt6H13G/MsqCz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1