General
-
Target
badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723
-
Size
530KB
-
Sample
241105-ppz7ks1crb
-
MD5
502ed4476c3dfa43e378098542f34454
-
SHA1
48e47074a2daf44c0bf67e665dc0594244a7da02
-
SHA256
badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723
-
SHA512
23da1faf871aea9e21b5840075180f9cb975589929082c07630c62ff94557610bee004b550131221d15f6966e56d0a704fb326e131e98b7a1e0a41214692a385
-
SSDEEP
12288:PMrGy90RCMowi1tXe2rPdiKDzMx4f5KXa/cKtjMA+O:JyajMXrrPdiMzDALK5MA+O
Static task
static1
Behavioral task
behavioral1
Sample
badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723
-
Size
530KB
-
MD5
502ed4476c3dfa43e378098542f34454
-
SHA1
48e47074a2daf44c0bf67e665dc0594244a7da02
-
SHA256
badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723
-
SHA512
23da1faf871aea9e21b5840075180f9cb975589929082c07630c62ff94557610bee004b550131221d15f6966e56d0a704fb326e131e98b7a1e0a41214692a385
-
SSDEEP
12288:PMrGy90RCMowi1tXe2rPdiKDzMx4f5KXa/cKtjMA+O:JyajMXrrPdiMzDALK5MA+O
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1