General
-
Target
81f00a27bb2980d7bc963726f97567bec236a3c4ab1e09c5c44d6b9b5928bf5eN.exe
-
Size
987KB
-
Sample
241123-zw13kaspfn
-
MD5
e3fe8cd7d72cfa064c8534504a3f8850
-
SHA1
905bf1d31e9b80e190db30985a2902d2348db643
-
SHA256
81f00a27bb2980d7bc963726f97567bec236a3c4ab1e09c5c44d6b9b5928bf5e
-
SHA512
94814981a684d602cbdfccffa368c4c570ea72732e2d3026fef99790a45c7c922dac3bd56d9f81ccad3fc3d7a2e8bd9f7dd60d12c508c742141641285b27b122
-
SSDEEP
24576:FyXzCt7blUDsaU/gGRpzQbL7VzV5hjNaMRvnW+tFhRSve:gXzCtNPoGRpz2LpzH+kvnW+tFh
Static task
static1
Behavioral task
behavioral1
Sample
81f00a27bb2980d7bc963726f97567bec236a3c4ab1e09c5c44d6b9b5928bf5eN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
81f00a27bb2980d7bc963726f97567bec236a3c4ab1e09c5c44d6b9b5928bf5eN.exe
-
Size
987KB
-
MD5
e3fe8cd7d72cfa064c8534504a3f8850
-
SHA1
905bf1d31e9b80e190db30985a2902d2348db643
-
SHA256
81f00a27bb2980d7bc963726f97567bec236a3c4ab1e09c5c44d6b9b5928bf5e
-
SHA512
94814981a684d602cbdfccffa368c4c570ea72732e2d3026fef99790a45c7c922dac3bd56d9f81ccad3fc3d7a2e8bd9f7dd60d12c508c742141641285b27b122
-
SSDEEP
24576:FyXzCt7blUDsaU/gGRpzQbL7VzV5hjNaMRvnW+tFhRSve:gXzCtNPoGRpz2LpzH+kvnW+tFh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1