General
-
Target
bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b
-
Size
697KB
-
Sample
241106-jvbhhsvrdw
-
MD5
5c973d896cd79f2f815126371799050b
-
SHA1
8f252014e29d31d82024dd940c5c24853c8441b7
-
SHA256
bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b
-
SHA512
de0835cb983e7239d6ad4111c612d0736d37686d49d50fc86fcb38f71d46c3d92bffad03f6d637d7f161e763c0a06910341e2c188c4687f7e88a7511b21d4d89
-
SSDEEP
12288:LMrhy907hv0+jqPfJvdgbXsU9SOZNkxbB0eHXJ3k5QbgKSpfpXx:WyGvTjqPfAzf2Txd0npf9x
Static task
static1
Behavioral task
behavioral1
Sample
bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b
-
Size
697KB
-
MD5
5c973d896cd79f2f815126371799050b
-
SHA1
8f252014e29d31d82024dd940c5c24853c8441b7
-
SHA256
bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b
-
SHA512
de0835cb983e7239d6ad4111c612d0736d37686d49d50fc86fcb38f71d46c3d92bffad03f6d637d7f161e763c0a06910341e2c188c4687f7e88a7511b21d4d89
-
SSDEEP
12288:LMrhy907hv0+jqPfJvdgbXsU9SOZNkxbB0eHXJ3k5QbgKSpfpXx:WyGvTjqPfAzf2Txd0npf9x
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1