General
-
Target
baab3b11a11870d9f48da9449f1d3dcd509472871d614aa8c02ae1e8fa897828
-
Size
529KB
-
Sample
241105-yshw5sxjb1
-
MD5
56344d7bcfc30e5e875128f6fc9e290f
-
SHA1
5a04b6fed49160efe88cba2c9d5ecd6f5a476926
-
SHA256
baab3b11a11870d9f48da9449f1d3dcd509472871d614aa8c02ae1e8fa897828
-
SHA512
613549d3dcfc1e533aca5480e8ba140dc8a5891222e78af2fa9cbbf1de747a4dd03be169d609c8634d27af9e03fc2e133023868c96e8c38d3a38573afc3d0f93
-
SSDEEP
12288:JMrqy90I+1uI0p9MPWDeAIGqeNOE1fw/ckp6bA:/y/+1uIs9M+DINOOE1Y/tp
Static task
static1
Behavioral task
behavioral1
Sample
baab3b11a11870d9f48da9449f1d3dcd509472871d614aa8c02ae1e8fa897828.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
baab3b11a11870d9f48da9449f1d3dcd509472871d614aa8c02ae1e8fa897828
-
Size
529KB
-
MD5
56344d7bcfc30e5e875128f6fc9e290f
-
SHA1
5a04b6fed49160efe88cba2c9d5ecd6f5a476926
-
SHA256
baab3b11a11870d9f48da9449f1d3dcd509472871d614aa8c02ae1e8fa897828
-
SHA512
613549d3dcfc1e533aca5480e8ba140dc8a5891222e78af2fa9cbbf1de747a4dd03be169d609c8634d27af9e03fc2e133023868c96e8c38d3a38573afc3d0f93
-
SSDEEP
12288:JMrqy90I+1uI0p9MPWDeAIGqeNOE1fw/ckp6bA:/y/+1uIs9M+DINOOE1Y/tp
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1