General
-
Target
8c67bf9550d7375eb5de51243412c4ff1f0244bb89f115835a9a8063b379c997
-
Size
662KB
-
Sample
241105-zzrcjaxrbv
-
MD5
22de8e7b9b3871c6f46875b616c1d29d
-
SHA1
258b7b37aa531bb68059d9569c39c84ee53748f4
-
SHA256
8c67bf9550d7375eb5de51243412c4ff1f0244bb89f115835a9a8063b379c997
-
SHA512
6c31eebb7d3a0ee42eb016a5ab7d10fc2c84515efd29c83c22ad9740b4e135258f848f576c622eed32f023f7572b590f0d60f015fb287e00e32442ae771f0fd0
-
SSDEEP
12288:LMray90DtT67ODfX2ArfwDJ3BR7WK2q0ELMZT2M5:pyctO7u7s7WK2q0ELE
Static task
static1
Behavioral task
behavioral1
Sample
8c67bf9550d7375eb5de51243412c4ff1f0244bb89f115835a9a8063b379c997.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
8c67bf9550d7375eb5de51243412c4ff1f0244bb89f115835a9a8063b379c997
-
Size
662KB
-
MD5
22de8e7b9b3871c6f46875b616c1d29d
-
SHA1
258b7b37aa531bb68059d9569c39c84ee53748f4
-
SHA256
8c67bf9550d7375eb5de51243412c4ff1f0244bb89f115835a9a8063b379c997
-
SHA512
6c31eebb7d3a0ee42eb016a5ab7d10fc2c84515efd29c83c22ad9740b4e135258f848f576c622eed32f023f7572b590f0d60f015fb287e00e32442ae771f0fd0
-
SSDEEP
12288:LMray90DtT67ODfX2ArfwDJ3BR7WK2q0ELMZT2M5:pyctO7u7s7WK2q0ELE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1