General
-
Target
40195042bdbaa902373afbee2359de476271bf70dab9813fe4dfa7bdb6640b04.exe
-
Size
392KB
-
Sample
241118-pnffsa1pel
-
MD5
c065b24d70ad37ec4ef889cfcded8b32
-
SHA1
066e65a67e80116957341567f2080e4acf4878ad
-
SHA256
40195042bdbaa902373afbee2359de476271bf70dab9813fe4dfa7bdb6640b04
-
SHA512
d3686e60cf27e9580cc2f691ba4816d32c9a936c5d98b2518845b4f64b84dfbf82116147b4058d5456c566ec7d6622b6a2db89e5a6dd94df7b94412eadacb0fd
-
SSDEEP
12288:UMr3y90QLR2iDLBcGErp7q6Bizy0Mm/yWpUXLvJ:TyHIglZiKzy0Mm/zpqJ
Static task
static1
Behavioral task
behavioral1
Sample
40195042bdbaa902373afbee2359de476271bf70dab9813fe4dfa7bdb6640b04.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
40195042bdbaa902373afbee2359de476271bf70dab9813fe4dfa7bdb6640b04.exe
-
Size
392KB
-
MD5
c065b24d70ad37ec4ef889cfcded8b32
-
SHA1
066e65a67e80116957341567f2080e4acf4878ad
-
SHA256
40195042bdbaa902373afbee2359de476271bf70dab9813fe4dfa7bdb6640b04
-
SHA512
d3686e60cf27e9580cc2f691ba4816d32c9a936c5d98b2518845b4f64b84dfbf82116147b4058d5456c566ec7d6622b6a2db89e5a6dd94df7b94412eadacb0fd
-
SSDEEP
12288:UMr3y90QLR2iDLBcGErp7q6Bizy0Mm/yWpUXLvJ:TyHIglZiKzy0Mm/zpqJ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1