General
-
Target
1258f55eb7579395e6298bdb524c4bd59437d0f3690f619ea882c0e7d98c7c17N.exe
-
Size
656KB
-
Sample
241126-lcb3favmfz
-
MD5
fe200be92fa00d33d66834003e8bd660
-
SHA1
795fa9c0c009dacf350d4342d8e97254223c7606
-
SHA256
1258f55eb7579395e6298bdb524c4bd59437d0f3690f619ea882c0e7d98c7c17
-
SHA512
9740ef2f92eda3ec2230920a6d5034fee62c1c0d4e5b85efe1c6c29e5e6098d6e2957b8541f950ba8507e72d6181d4d9a1c032dfcb37a8dee5c11b5dd65bef88
-
SSDEEP
12288:sMrKy90ioqoq5+bLsJDp4hoP2SGFcZ5SBKdmZZfEFsL/5ep:Oy9oBDqDp4huRGFO5WKg2uA
Static task
static1
Behavioral task
behavioral1
Sample
1258f55eb7579395e6298bdb524c4bd59437d0f3690f619ea882c0e7d98c7c17N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Targets
-
-
Target
1258f55eb7579395e6298bdb524c4bd59437d0f3690f619ea882c0e7d98c7c17N.exe
-
Size
656KB
-
MD5
fe200be92fa00d33d66834003e8bd660
-
SHA1
795fa9c0c009dacf350d4342d8e97254223c7606
-
SHA256
1258f55eb7579395e6298bdb524c4bd59437d0f3690f619ea882c0e7d98c7c17
-
SHA512
9740ef2f92eda3ec2230920a6d5034fee62c1c0d4e5b85efe1c6c29e5e6098d6e2957b8541f950ba8507e72d6181d4d9a1c032dfcb37a8dee5c11b5dd65bef88
-
SSDEEP
12288:sMrKy90ioqoq5+bLsJDp4hoP2SGFcZ5SBKdmZZfEFsL/5ep:Oy9oBDqDp4huRGFO5WKg2uA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1