General
-
Target
b9a5e43fc2f4b7d201f67830376a13359a1e5af2124ba74702e1acb40434e885
-
Size
533KB
-
Sample
241105-3mm15asajq
-
MD5
cb7251f11c7028d89dc86ed9769a076c
-
SHA1
64804a097a46a4e8c29f542c740f4bb92e0a77f8
-
SHA256
b9a5e43fc2f4b7d201f67830376a13359a1e5af2124ba74702e1acb40434e885
-
SHA512
8c1087c27dedac446ba8a9507d87d9909a6ac5255afc671674fd399bfbc5a0f5b76e314fe29647d0a9aeb643850f49932ac34024c889ba5b2be3454421dc77fb
-
SSDEEP
12288:PMr6y90pRTQ10NAF9XwBYpMzW0LNcxiPu:RyskOaF9X3pMi0LNMUu
Static task
static1
Behavioral task
behavioral1
Sample
b9a5e43fc2f4b7d201f67830376a13359a1e5af2124ba74702e1acb40434e885.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
b9a5e43fc2f4b7d201f67830376a13359a1e5af2124ba74702e1acb40434e885
-
Size
533KB
-
MD5
cb7251f11c7028d89dc86ed9769a076c
-
SHA1
64804a097a46a4e8c29f542c740f4bb92e0a77f8
-
SHA256
b9a5e43fc2f4b7d201f67830376a13359a1e5af2124ba74702e1acb40434e885
-
SHA512
8c1087c27dedac446ba8a9507d87d9909a6ac5255afc671674fd399bfbc5a0f5b76e314fe29647d0a9aeb643850f49932ac34024c889ba5b2be3454421dc77fb
-
SSDEEP
12288:PMr6y90pRTQ10NAF9XwBYpMzW0LNcxiPu:RyskOaF9X3pMi0LNMUu
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1