General
-
Target
a4ba853db8eb565a54b6991b61aa755b927c1dc48e46876f54cb418995e1badc.exe
-
Size
656KB
-
Sample
241126-tylg1avqgl
-
MD5
c04db26229058f1d18d44c399ae6a681
-
SHA1
d8fc26f734800ef639219afda59922b970f6b9d7
-
SHA256
a4ba853db8eb565a54b6991b61aa755b927c1dc48e46876f54cb418995e1badc
-
SHA512
3b5b5dc8d36467656ec0013bd061bc8e49872abf283ae9764cded77cf53094d0c8113cc3f2342313c736006f6897091b8f3ac5d5224a58d7e27c5974c0e44095
-
SSDEEP
12288:sMrKy90ioqoq5+bLsJDp4hoP2SGFcZ5SBKdmZZfEFsL/5epW:Oy9oBDqDp4huRGFO5WKg2uAW
Static task
static1
Behavioral task
behavioral1
Sample
a4ba853db8eb565a54b6991b61aa755b927c1dc48e46876f54cb418995e1badc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Targets
-
-
Target
a4ba853db8eb565a54b6991b61aa755b927c1dc48e46876f54cb418995e1badc.exe
-
Size
656KB
-
MD5
c04db26229058f1d18d44c399ae6a681
-
SHA1
d8fc26f734800ef639219afda59922b970f6b9d7
-
SHA256
a4ba853db8eb565a54b6991b61aa755b927c1dc48e46876f54cb418995e1badc
-
SHA512
3b5b5dc8d36467656ec0013bd061bc8e49872abf283ae9764cded77cf53094d0c8113cc3f2342313c736006f6897091b8f3ac5d5224a58d7e27c5974c0e44095
-
SSDEEP
12288:sMrKy90ioqoq5+bLsJDp4hoP2SGFcZ5SBKdmZZfEFsL/5epW:Oy9oBDqDp4huRGFO5WKg2uAW
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1