General
-
Target
3b3d4f7e5431c7e9ca5b6062bdc0f372757468b19d480913506140965c62e767
-
Size
530KB
-
Sample
241105-jb19tsxhnk
-
MD5
8f12465fdd555102d9ebb663cd144bd6
-
SHA1
4f6960d0a7aba4b0e3d43baba254ca3f65680a52
-
SHA256
3b3d4f7e5431c7e9ca5b6062bdc0f372757468b19d480913506140965c62e767
-
SHA512
2d9f8259e81df8393deb91da957f2b7a8c0dee38f9428e202f12af2f20c19b8fd23f33c8fce8c0abbb2211e9e17df78ff268b16dd4e49fb719ca937589962a6e
-
SSDEEP
12288:iMrYy90CONINcG35bGb7ONYXQN8xrI0WV+7Xw3zE8V:WyHOq135bG7OYAN8l5W3g8V
Static task
static1
Behavioral task
behavioral1
Sample
3b3d4f7e5431c7e9ca5b6062bdc0f372757468b19d480913506140965c62e767.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
3b3d4f7e5431c7e9ca5b6062bdc0f372757468b19d480913506140965c62e767
-
Size
530KB
-
MD5
8f12465fdd555102d9ebb663cd144bd6
-
SHA1
4f6960d0a7aba4b0e3d43baba254ca3f65680a52
-
SHA256
3b3d4f7e5431c7e9ca5b6062bdc0f372757468b19d480913506140965c62e767
-
SHA512
2d9f8259e81df8393deb91da957f2b7a8c0dee38f9428e202f12af2f20c19b8fd23f33c8fce8c0abbb2211e9e17df78ff268b16dd4e49fb719ca937589962a6e
-
SSDEEP
12288:iMrYy90CONINcG35bGb7ONYXQN8xrI0WV+7Xw3zE8V:WyHOq135bG7OYAN8l5W3g8V
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1