General
-
Target
b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3
-
Size
537KB
-
Sample
241105-qm63sa1hje
-
MD5
d49c21694613ed18eb1bfcb48c9bd1ce
-
SHA1
cfa3c6ceef6f0a90618f7d31cabc2e193de0460c
-
SHA256
b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3
-
SHA512
85e2d465aec35da92ec965da4001cacaabc88bdf08be6f2d77cf23c321e6064fdd1f75739e6e0eafbe922910a93a1ac01240192688df21a8c303cf09a76a227e
-
SSDEEP
12288:xMrly90fzimHhWpg8z0eUqWHWwoJs3CtXlb:8y4HYPAem2wAs34t
Static task
static1
Behavioral task
behavioral1
Sample
b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3
-
Size
537KB
-
MD5
d49c21694613ed18eb1bfcb48c9bd1ce
-
SHA1
cfa3c6ceef6f0a90618f7d31cabc2e193de0460c
-
SHA256
b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3
-
SHA512
85e2d465aec35da92ec965da4001cacaabc88bdf08be6f2d77cf23c321e6064fdd1f75739e6e0eafbe922910a93a1ac01240192688df21a8c303cf09a76a227e
-
SSDEEP
12288:xMrly90fzimHhWpg8z0eUqWHWwoJs3CtXlb:8y4HYPAem2wAs34t
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1