General
-
Target
b78f617b4472c6772007949e17180f6be4b61378758a13d57970a13b6c87d0cb
-
Size
560KB
-
Sample
241106-km8cysxeql
-
MD5
142e0490856521236f99ee06b5a48023
-
SHA1
46d434be635c20a8504f31f5b5b404945c4c1ae1
-
SHA256
b78f617b4472c6772007949e17180f6be4b61378758a13d57970a13b6c87d0cb
-
SHA512
8f1da68fd8b2b89aae7473672ec4337d9c0d21d15824a9916db079a08d4cb172fb5453de1e08cda69983fcc8b326f1cc5dd07588b1e24d88a4dbc7ac22bb166d
-
SSDEEP
12288:NMr+y90BCNqhw8PmLmYpr/BReUivebcRqnqu5rY/:zyctAr5Yvveb0u5q
Static task
static1
Behavioral task
behavioral1
Sample
b78f617b4472c6772007949e17180f6be4b61378758a13d57970a13b6c87d0cb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
b78f617b4472c6772007949e17180f6be4b61378758a13d57970a13b6c87d0cb
-
Size
560KB
-
MD5
142e0490856521236f99ee06b5a48023
-
SHA1
46d434be635c20a8504f31f5b5b404945c4c1ae1
-
SHA256
b78f617b4472c6772007949e17180f6be4b61378758a13d57970a13b6c87d0cb
-
SHA512
8f1da68fd8b2b89aae7473672ec4337d9c0d21d15824a9916db079a08d4cb172fb5453de1e08cda69983fcc8b326f1cc5dd07588b1e24d88a4dbc7ac22bb166d
-
SSDEEP
12288:NMr+y90BCNqhw8PmLmYpr/BReUivebcRqnqu5rY/:zyctAr5Yvveb0u5q
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1