General
-
Target
bccbae1a60568f0c5441267657067d4b541dbcbfc4aa6fe8e3fb53e671689d30
-
Size
660KB
-
Sample
241105-w5sk1aynap
-
MD5
58171e3674bcee83b40b57a1d9a6bca9
-
SHA1
0d4fc8ad0cce05a9cd37c80009ac353f0b2bf485
-
SHA256
bccbae1a60568f0c5441267657067d4b541dbcbfc4aa6fe8e3fb53e671689d30
-
SHA512
d9511c3228ebf1048158790479265d4daecc399379469dff5afbbe8e3296a754e16b093541df275a48cded4f730fcda22048bca0214a87bc04d8cb104b1724e9
-
SSDEEP
12288:1MrSy90VQe4Lq2gsP72gGiVojKA2YBAfcftjzJ2Px48Rxuy8FVH7S6Co03z0i+j:Py8942gDGrBicf9lw48RxW7Sh1z0t
Static task
static1
Behavioral task
behavioral1
Sample
bccbae1a60568f0c5441267657067d4b541dbcbfc4aa6fe8e3fb53e671689d30.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
bccbae1a60568f0c5441267657067d4b541dbcbfc4aa6fe8e3fb53e671689d30
-
Size
660KB
-
MD5
58171e3674bcee83b40b57a1d9a6bca9
-
SHA1
0d4fc8ad0cce05a9cd37c80009ac353f0b2bf485
-
SHA256
bccbae1a60568f0c5441267657067d4b541dbcbfc4aa6fe8e3fb53e671689d30
-
SHA512
d9511c3228ebf1048158790479265d4daecc399379469dff5afbbe8e3296a754e16b093541df275a48cded4f730fcda22048bca0214a87bc04d8cb104b1724e9
-
SSDEEP
12288:1MrSy90VQe4Lq2gsP72gGiVojKA2YBAfcftjzJ2Px48Rxuy8FVH7S6Co03z0i+j:Py8942gDGrBicf9lw48RxW7Sh1z0t
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1