General
-
Target
bf997da4d9959531292eec0cc69a9f66f124574bb2a98162ba6e9c06133a8418
-
Size
522KB
-
Sample
241104-raryrstkfm
-
MD5
ae290ca8ac138b64b1afee79dc1ff9d6
-
SHA1
f929f73d2381a8b0acc7f3d56b522ad4d03b0ec4
-
SHA256
bf997da4d9959531292eec0cc69a9f66f124574bb2a98162ba6e9c06133a8418
-
SHA512
85ca2c092ba013f3d3ea4b4bc9185a3355f7b8c3c19e0d8c90f9b4077f8e720ca047b9de029594defb165f55a7697808291b0f6595d28dbdf90623c755952643
-
SSDEEP
12288:VMrzy90YNyOwdde+P5QFEDPEkNg3Z/iHdt/2cL:SyIBphQFEjvN8Z/iHdt/lL
Static task
static1
Behavioral task
behavioral1
Sample
bf997da4d9959531292eec0cc69a9f66f124574bb2a98162ba6e9c06133a8418.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
bf997da4d9959531292eec0cc69a9f66f124574bb2a98162ba6e9c06133a8418
-
Size
522KB
-
MD5
ae290ca8ac138b64b1afee79dc1ff9d6
-
SHA1
f929f73d2381a8b0acc7f3d56b522ad4d03b0ec4
-
SHA256
bf997da4d9959531292eec0cc69a9f66f124574bb2a98162ba6e9c06133a8418
-
SHA512
85ca2c092ba013f3d3ea4b4bc9185a3355f7b8c3c19e0d8c90f9b4077f8e720ca047b9de029594defb165f55a7697808291b0f6595d28dbdf90623c755952643
-
SSDEEP
12288:VMrzy90YNyOwdde+P5QFEDPEkNg3Z/iHdt/2cL:SyIBphQFEjvN8Z/iHdt/lL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1