General
-
Target
10d69de052da95c17594239bfdedd0da405529e065c3f4e136efcb2f08ebac51.exe
-
Size
383KB
-
Sample
241118-v38zjasblj
-
MD5
df2c1e3f15fd3e2e30ba4ef438983deb
-
SHA1
5bac4e78409037d5fd5f3385909586a9900a5506
-
SHA256
10d69de052da95c17594239bfdedd0da405529e065c3f4e136efcb2f08ebac51
-
SHA512
393048d7cfb2305e515ba693a96ff6b613d0bc352c180ed49e62b7921d1f84180fa283e94261e9745a792b04a12727739e473834ce409537e180d4f34681cc71
-
SSDEEP
6144:Kay+bnr+zp0yN90QE8RVq38RJFJm5VhgUGE4D/zTHyVEsos1FUAXEGRmgQQOaS+J:OMrjy90SRc8byXhgE4D7TmEJniEGUgQg
Static task
static1
Behavioral task
behavioral1
Sample
10d69de052da95c17594239bfdedd0da405529e065c3f4e136efcb2f08ebac51.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
10d69de052da95c17594239bfdedd0da405529e065c3f4e136efcb2f08ebac51.exe
-
Size
383KB
-
MD5
df2c1e3f15fd3e2e30ba4ef438983deb
-
SHA1
5bac4e78409037d5fd5f3385909586a9900a5506
-
SHA256
10d69de052da95c17594239bfdedd0da405529e065c3f4e136efcb2f08ebac51
-
SHA512
393048d7cfb2305e515ba693a96ff6b613d0bc352c180ed49e62b7921d1f84180fa283e94261e9745a792b04a12727739e473834ce409537e180d4f34681cc71
-
SSDEEP
6144:Kay+bnr+zp0yN90QE8RVq38RJFJm5VhgUGE4D/zTHyVEsos1FUAXEGRmgQQOaS+J:OMrjy90SRc8byXhgE4D7TmEJniEGUgQg
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1