General
-
Target
b984e1decb5f81585d6dbbf63b14d64fe3092c6d1252d6247ac33da087f0c02b
-
Size
689KB
-
Sample
241106-j19bqsxbpm
-
MD5
bb5b53f7b0f0501957a56d863a361876
-
SHA1
362646f2b546acdbd370c84c7c9a41138e2b7829
-
SHA256
b984e1decb5f81585d6dbbf63b14d64fe3092c6d1252d6247ac33da087f0c02b
-
SHA512
2c75a636a89eb0fed3cfcb5b727aff0c94cb0a88748577ad82ae1cecc7a5aed2caf2da6f91312be28cfce35018d4fe13dd995cb40d3afa9d049c3a956dfd1b2d
-
SSDEEP
12288:jMray90Gj0uTEV4InUvdOfzPuBN4IPvkZEOzXFIbdGr8v/IU:py9YV4InUFOfzmBN4gvkJX+BG4Z
Static task
static1
Behavioral task
behavioral1
Sample
b984e1decb5f81585d6dbbf63b14d64fe3092c6d1252d6247ac33da087f0c02b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
b984e1decb5f81585d6dbbf63b14d64fe3092c6d1252d6247ac33da087f0c02b
-
Size
689KB
-
MD5
bb5b53f7b0f0501957a56d863a361876
-
SHA1
362646f2b546acdbd370c84c7c9a41138e2b7829
-
SHA256
b984e1decb5f81585d6dbbf63b14d64fe3092c6d1252d6247ac33da087f0c02b
-
SHA512
2c75a636a89eb0fed3cfcb5b727aff0c94cb0a88748577ad82ae1cecc7a5aed2caf2da6f91312be28cfce35018d4fe13dd995cb40d3afa9d049c3a956dfd1b2d
-
SSDEEP
12288:jMray90Gj0uTEV4InUvdOfzPuBN4IPvkZEOzXFIbdGr8v/IU:py9YV4InUFOfzmBN4gvkJX+BG4Z
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1