General
-
Target
5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe
-
Size
666KB
-
Sample
250208-jszsbstmdt
-
MD5
697bc8adb11b2ac8ebcd4838dc9eb380
-
SHA1
64dfe94319b2de1984fdf23a3fa08d386caf3593
-
SHA256
5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151a
-
SHA512
84351d8f32d134ad8136c28958bfe81259b5f85c9752d0aa30900be93a0b6640429941ef224688d42768f247ee669c224ccc01f6d6e2cda98cbd36edfaee0449
-
SSDEEP
12288:+MrWy90c+Lx/yr1/1ZcjdWpNu9dDhTTwwgGYaEYQlaLMz9pzwOFVx:0ypWUgzFTTwwgGYaZjL4z1J
Static task
static1
Behavioral task
behavioral1
Sample
5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe
-
Size
666KB
-
MD5
697bc8adb11b2ac8ebcd4838dc9eb380
-
SHA1
64dfe94319b2de1984fdf23a3fa08d386caf3593
-
SHA256
5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151a
-
SHA512
84351d8f32d134ad8136c28958bfe81259b5f85c9752d0aa30900be93a0b6640429941ef224688d42768f247ee669c224ccc01f6d6e2cda98cbd36edfaee0449
-
SSDEEP
12288:+MrWy90c+Lx/yr1/1ZcjdWpNu9dDhTTwwgGYaEYQlaLMz9pzwOFVx:0ypWUgzFTTwwgGYaZjL4z1J
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4