General
-
Target
4744b6c9f72acccad27ba46c03351054397ad4f105b60843df1e3bbfe42aa785.exe
-
Size
383KB
-
Sample
241119-mxdbnszlem
-
MD5
c1d31414eec1395fc45ce19bab3b0f4c
-
SHA1
2ee2a7e383bfd26592dd25d7edf44068907021ab
-
SHA256
4744b6c9f72acccad27ba46c03351054397ad4f105b60843df1e3bbfe42aa785
-
SHA512
9e664b848ffb7d63de4494ac1557aae229d9fcbb056b039d0de6a37af7c70ea0b310ae844aa079389d31e3ab06ea7edcd83fe483f585ccd9b63811fbeea63f6e
-
SSDEEP
6144:KGy+bnr+hp0yN90QEANGttH3Jy9joaRTH2VEsosBFUeyvwhgQAo2oRl:mMrNy90ie3ARTCEJb1EgQA0Rl
Static task
static1
Behavioral task
behavioral1
Sample
4744b6c9f72acccad27ba46c03351054397ad4f105b60843df1e3bbfe42aa785.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
4744b6c9f72acccad27ba46c03351054397ad4f105b60843df1e3bbfe42aa785.exe
-
Size
383KB
-
MD5
c1d31414eec1395fc45ce19bab3b0f4c
-
SHA1
2ee2a7e383bfd26592dd25d7edf44068907021ab
-
SHA256
4744b6c9f72acccad27ba46c03351054397ad4f105b60843df1e3bbfe42aa785
-
SHA512
9e664b848ffb7d63de4494ac1557aae229d9fcbb056b039d0de6a37af7c70ea0b310ae844aa079389d31e3ab06ea7edcd83fe483f585ccd9b63811fbeea63f6e
-
SSDEEP
6144:KGy+bnr+hp0yN90QEANGttH3Jy9joaRTH2VEsosBFUeyvwhgQAo2oRl:mMrNy90ie3ARTCEJb1EgQA0Rl
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1