General
-
Target
b850adc15323e2f0aba72c0c576d98d34dddc9d38dd31ab90d8afa8227539847
-
Size
700KB
-
Sample
241105-1e9tta1qep
-
MD5
92b45563d499965952595cb97465d1e9
-
SHA1
4c571d9dc9a99899f4bea9233a30f427c7f2fb8f
-
SHA256
b850adc15323e2f0aba72c0c576d98d34dddc9d38dd31ab90d8afa8227539847
-
SHA512
b829ee2df0d6f7af57f43df48b534b459268b6dd8530d0a61e758245d39a8b6ef30079ee5bbe159b8eca3c3563c4b02fd18ddb8ecba4f5c83e9f0c77124e29c0
-
SSDEEP
12288:YMrDy90EhFSFQDr+Eg9DSlcAXeuBG8F3lTEjByGquY2JIt7:rythDHzXeuBG8V2Vy7uY2Js
Static task
static1
Behavioral task
behavioral1
Sample
b850adc15323e2f0aba72c0c576d98d34dddc9d38dd31ab90d8afa8227539847.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
b850adc15323e2f0aba72c0c576d98d34dddc9d38dd31ab90d8afa8227539847
-
Size
700KB
-
MD5
92b45563d499965952595cb97465d1e9
-
SHA1
4c571d9dc9a99899f4bea9233a30f427c7f2fb8f
-
SHA256
b850adc15323e2f0aba72c0c576d98d34dddc9d38dd31ab90d8afa8227539847
-
SHA512
b829ee2df0d6f7af57f43df48b534b459268b6dd8530d0a61e758245d39a8b6ef30079ee5bbe159b8eca3c3563c4b02fd18ddb8ecba4f5c83e9f0c77124e29c0
-
SSDEEP
12288:YMrDy90EhFSFQDr+Eg9DSlcAXeuBG8F3lTEjByGquY2JIt7:rythDHzXeuBG8V2Vy7uY2Js
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1