General
-
Target
b1d46b67947a0a9781db1aa96c08a82fc3e9155535467052181e3afcc2a2d0c5
-
Size
1000KB
-
Sample
241106-ljmshsybql
-
MD5
3d1a92bb154c49a5b04d61c63c0b4b91
-
SHA1
a472b856b4f8aaaf1484eaecfdcc11e88fe9c7ea
-
SHA256
b1d46b67947a0a9781db1aa96c08a82fc3e9155535467052181e3afcc2a2d0c5
-
SHA512
4fcbaae760dc6087cdce4e883d526c15c5b66e9a3d4a118f5b7538631c9dcf09effb901ee5dd7a73d13317d9583ed79b40f3391d248eb981746a97b4ae89916e
-
SSDEEP
24576:SyO2dOruMJNGYpvtw6xShsab7oBdCwLmdWWktt2w:5O2dOFJNGgwO8Fm4wQWTt
Static task
static1
Behavioral task
behavioral1
Sample
b1d46b67947a0a9781db1aa96c08a82fc3e9155535467052181e3afcc2a2d0c5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
b1d46b67947a0a9781db1aa96c08a82fc3e9155535467052181e3afcc2a2d0c5
-
Size
1000KB
-
MD5
3d1a92bb154c49a5b04d61c63c0b4b91
-
SHA1
a472b856b4f8aaaf1484eaecfdcc11e88fe9c7ea
-
SHA256
b1d46b67947a0a9781db1aa96c08a82fc3e9155535467052181e3afcc2a2d0c5
-
SHA512
4fcbaae760dc6087cdce4e883d526c15c5b66e9a3d4a118f5b7538631c9dcf09effb901ee5dd7a73d13317d9583ed79b40f3391d248eb981746a97b4ae89916e
-
SSDEEP
24576:SyO2dOruMJNGYpvtw6xShsab7oBdCwLmdWWktt2w:5O2dOFJNGgwO8Fm4wQWTt
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1