General
-
Target
b7142e99dd2be7712e2658fbe4a9cd4ed860a1d24057ac2cf0f607140c13a8ce
-
Size
659KB
-
Sample
241105-sjlzjsspav
-
MD5
154c966f95c55aa7939a689e19615520
-
SHA1
756b782fbb44a106524e49810d6771c17c92d9ad
-
SHA256
b7142e99dd2be7712e2658fbe4a9cd4ed860a1d24057ac2cf0f607140c13a8ce
-
SHA512
e2272fcf48665b45310e4cde192e6a02031b93c45b95169348e963dbd8f3078e3628b93654e6d4cd6a56f9994e2a75287ac481d7bb43673f359f3ab4f6ab3318
-
SSDEEP
12288:8Mr4y90FX/jeUCVzUpsCPGrBoi9+0SK4Y+ESZxLyPGrNqZ:0ywAqpsdtE/Kd+ESzLyPd
Static task
static1
Behavioral task
behavioral1
Sample
b7142e99dd2be7712e2658fbe4a9cd4ed860a1d24057ac2cf0f607140c13a8ce.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
b7142e99dd2be7712e2658fbe4a9cd4ed860a1d24057ac2cf0f607140c13a8ce
-
Size
659KB
-
MD5
154c966f95c55aa7939a689e19615520
-
SHA1
756b782fbb44a106524e49810d6771c17c92d9ad
-
SHA256
b7142e99dd2be7712e2658fbe4a9cd4ed860a1d24057ac2cf0f607140c13a8ce
-
SHA512
e2272fcf48665b45310e4cde192e6a02031b93c45b95169348e963dbd8f3078e3628b93654e6d4cd6a56f9994e2a75287ac481d7bb43673f359f3ab4f6ab3318
-
SSDEEP
12288:8Mr4y90FX/jeUCVzUpsCPGrBoi9+0SK4Y+ESZxLyPGrNqZ:0ywAqpsdtE/Kd+ESzLyPd
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1