General
-
Target
bd215b4418042b8e0cf0891ffd392a3cf80c77dc81a9a1c4bee9b49f091904f3
-
Size
522KB
-
Sample
241104-qz2c3atjar
-
MD5
2b7eebeeb118d69f204e9cb163961de4
-
SHA1
c05d36f9755576dd47457b921b7b93428315a50b
-
SHA256
bd215b4418042b8e0cf0891ffd392a3cf80c77dc81a9a1c4bee9b49f091904f3
-
SHA512
f1c919b1835694eb928981ee98090b89bd0ef2135418f94974806908b0fb43d866f74ce38d47e9dcb4db98c4b823581cab403969425a261a64db4424e9d8c915
-
SSDEEP
6144:Kly+bnr+Ep0yN90QEbQp1Mt7Ux3o0xFR2vPSmv5wCKYngvikt02tzedvOCdKCRRz:vMrMy901QpM7UlVihfktsC6aro
Static task
static1
Behavioral task
behavioral1
Sample
bd215b4418042b8e0cf0891ffd392a3cf80c77dc81a9a1c4bee9b49f091904f3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
bd215b4418042b8e0cf0891ffd392a3cf80c77dc81a9a1c4bee9b49f091904f3
-
Size
522KB
-
MD5
2b7eebeeb118d69f204e9cb163961de4
-
SHA1
c05d36f9755576dd47457b921b7b93428315a50b
-
SHA256
bd215b4418042b8e0cf0891ffd392a3cf80c77dc81a9a1c4bee9b49f091904f3
-
SHA512
f1c919b1835694eb928981ee98090b89bd0ef2135418f94974806908b0fb43d866f74ce38d47e9dcb4db98c4b823581cab403969425a261a64db4424e9d8c915
-
SSDEEP
6144:Kly+bnr+Ep0yN90QEbQp1Mt7Ux3o0xFR2vPSmv5wCKYngvikt02tzedvOCdKCRRz:vMrMy901QpM7UlVihfktsC6aro
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1