General
-
Target
6dbc490c365d8e1f18044c9b64991ec2f725d4175b20c916b063eb6b63513c68
-
Size
553KB
-
Sample
241105-xbebysynhr
-
MD5
eae29f4ebc0c1f47527c52793dd041f2
-
SHA1
bb524b0562ae4f7bfdf22c4cd606e43f383018f2
-
SHA256
6dbc490c365d8e1f18044c9b64991ec2f725d4175b20c916b063eb6b63513c68
-
SHA512
0647c7d76bdd244650f8962e4293c40160b46b543542de5d4bdca42919f2e4939e6d4ad7b403765ed0a6e7ab0814758fd831c68b44abd860700b9c6cf137080c
-
SSDEEP
12288:zMrby90Op1/c80A/qMMFO7HKXFjJiNZ0AB7Vnhc9Qs6qIcp7:gyvp1080GbMFO7SFjKZFDhc9QsvF7
Static task
static1
Behavioral task
behavioral1
Sample
6dbc490c365d8e1f18044c9b64991ec2f725d4175b20c916b063eb6b63513c68.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
6dbc490c365d8e1f18044c9b64991ec2f725d4175b20c916b063eb6b63513c68
-
Size
553KB
-
MD5
eae29f4ebc0c1f47527c52793dd041f2
-
SHA1
bb524b0562ae4f7bfdf22c4cd606e43f383018f2
-
SHA256
6dbc490c365d8e1f18044c9b64991ec2f725d4175b20c916b063eb6b63513c68
-
SHA512
0647c7d76bdd244650f8962e4293c40160b46b543542de5d4bdca42919f2e4939e6d4ad7b403765ed0a6e7ab0814758fd831c68b44abd860700b9c6cf137080c
-
SSDEEP
12288:zMrby90Op1/c80A/qMMFO7HKXFjJiNZ0AB7Vnhc9Qs6qIcp7:gyvp1080GbMFO7SFjKZFDhc9QsvF7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1