General
-
Target
3f7737e2fcd58096c064623ae35186afd664a4486878b1676f0249cec810bf5e.exe
-
Size
807KB
-
Sample
241119-hqfe8ssdmn
-
MD5
b5aa1adb4dae342eb835fb9e202adda5
-
SHA1
07ac7addaa7711d95df51fe5e365c85f58409c07
-
SHA256
3f7737e2fcd58096c064623ae35186afd664a4486878b1676f0249cec810bf5e
-
SHA512
3d5fd1d4c19a41822352af5e571b7f7b8457acfbaa2a507862ef9d9b4905cc974ca2e31a85df50097050ffcc6f5ae6ce6604c42da54876b261afb3595019c11f
-
SSDEEP
24576:cyaUl8Fn1TuJdKGNg0v/wdK2d/Nw/2WOp4:L01SJ3HwdK2HwOWOe
Static task
static1
Behavioral task
behavioral1
Sample
3f7737e2fcd58096c064623ae35186afd664a4486878b1676f0249cec810bf5e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
3f7737e2fcd58096c064623ae35186afd664a4486878b1676f0249cec810bf5e.exe
-
Size
807KB
-
MD5
b5aa1adb4dae342eb835fb9e202adda5
-
SHA1
07ac7addaa7711d95df51fe5e365c85f58409c07
-
SHA256
3f7737e2fcd58096c064623ae35186afd664a4486878b1676f0249cec810bf5e
-
SHA512
3d5fd1d4c19a41822352af5e571b7f7b8457acfbaa2a507862ef9d9b4905cc974ca2e31a85df50097050ffcc6f5ae6ce6604c42da54876b261afb3595019c11f
-
SSDEEP
24576:cyaUl8Fn1TuJdKGNg0v/wdK2d/Nw/2WOp4:L01SJ3HwdK2HwOWOe
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1