General
-
Target
b8ab16322f16da5aa983938ad9a88bb4bd5b755fbdb48dcad2d79cf8d8b10e3f
-
Size
694KB
-
Sample
241105-xml6yawkgt
-
MD5
1ab185612cfba54f22399b06b3617a3c
-
SHA1
ecc54be9398bc17232e9cf9a14a2a52db3e6cbcc
-
SHA256
b8ab16322f16da5aa983938ad9a88bb4bd5b755fbdb48dcad2d79cf8d8b10e3f
-
SHA512
47e79e8dc37c34f41bbfcbd142fdef98bd2e8fbf355e9a0ce47145c9127d3d2ba3edca63f335931f430e4c00ed7d446a592df1d4b491aabbd129bc4cee09f098
-
SSDEEP
12288:FMrRy903N4+xJKEK9tYXkRTaDzCDdb7h96NVZLWZWI4Zwxc/MHao:Iy8xAZTOuDdbX+PWc7PM6o
Static task
static1
Behavioral task
behavioral1
Sample
b8ab16322f16da5aa983938ad9a88bb4bd5b755fbdb48dcad2d79cf8d8b10e3f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
b8ab16322f16da5aa983938ad9a88bb4bd5b755fbdb48dcad2d79cf8d8b10e3f
-
Size
694KB
-
MD5
1ab185612cfba54f22399b06b3617a3c
-
SHA1
ecc54be9398bc17232e9cf9a14a2a52db3e6cbcc
-
SHA256
b8ab16322f16da5aa983938ad9a88bb4bd5b755fbdb48dcad2d79cf8d8b10e3f
-
SHA512
47e79e8dc37c34f41bbfcbd142fdef98bd2e8fbf355e9a0ce47145c9127d3d2ba3edca63f335931f430e4c00ed7d446a592df1d4b491aabbd129bc4cee09f098
-
SSDEEP
12288:FMrRy903N4+xJKEK9tYXkRTaDzCDdb7h96NVZLWZWI4Zwxc/MHao:Iy8xAZTOuDdbX+PWc7PM6o
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1