General
-
Target
21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5
-
Size
537KB
-
Sample
241105-mzpsgsslfl
-
MD5
be55fa7c5c9d2bba5faad5d6a579d60d
-
SHA1
2c7c8ecd612bb51bcf76311c73db416609c753cf
-
SHA256
21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5
-
SHA512
e5ccf403cb3ff02950e4da4c3aa204eea028ff62bbf0e9d11e249a216a3a8b325bbb7c3320338e667763bd33a167a3fbfb9dfb53ddf6dadd5877a31987313be7
-
SSDEEP
12288:vMrqy90/TRQcauBvUMEIVYawUv+Hzww6psTd6ohMkBUF:JyeRBUMEI9wPTwwT4oycUF
Static task
static1
Behavioral task
behavioral1
Sample
21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5
-
Size
537KB
-
MD5
be55fa7c5c9d2bba5faad5d6a579d60d
-
SHA1
2c7c8ecd612bb51bcf76311c73db416609c753cf
-
SHA256
21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5
-
SHA512
e5ccf403cb3ff02950e4da4c3aa204eea028ff62bbf0e9d11e249a216a3a8b325bbb7c3320338e667763bd33a167a3fbfb9dfb53ddf6dadd5877a31987313be7
-
SSDEEP
12288:vMrqy90/TRQcauBvUMEIVYawUv+Hzww6psTd6ohMkBUF:JyeRBUMEI9wPTwwT4oycUF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1