General
-
Target
8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5
-
Size
660KB
-
Sample
241105-w4rx3swcna
-
MD5
857e34f22dbe32e8f9046bda15a877c0
-
SHA1
4dfc57646d790022c83bd6bda1d927896d4fd321
-
SHA256
8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5
-
SHA512
910e09ae93b5279e5d4d7bd4da5d66e70828cf1de8e1f158498bcb2c0a03c78a6605aefa16b0721dbc385ed5026134ca908ba69cec9c5cfa9c1e34e79a5b2b97
-
SSDEEP
12288:6MrOy90eMaqSuy/rYKQhfCltnN8PnXzlIUlifyoQCFvAft/juH/+ySA:QyEa9uyUMtN4XinrdFIB+/+yD
Static task
static1
Behavioral task
behavioral1
Sample
8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5
-
Size
660KB
-
MD5
857e34f22dbe32e8f9046bda15a877c0
-
SHA1
4dfc57646d790022c83bd6bda1d927896d4fd321
-
SHA256
8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5
-
SHA512
910e09ae93b5279e5d4d7bd4da5d66e70828cf1de8e1f158498bcb2c0a03c78a6605aefa16b0721dbc385ed5026134ca908ba69cec9c5cfa9c1e34e79a5b2b97
-
SSDEEP
12288:6MrOy90eMaqSuy/rYKQhfCltnN8PnXzlIUlifyoQCFvAft/juH/+ySA:QyEa9uyUMtN4XinrdFIB+/+yD
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1