General
-
Target
bfc01ac48222dbc93094ea1e104b50cb29911d5091b59caa9fd74f3dc183aebe
-
Size
658KB
-
Sample
241106-shetvashnq
-
MD5
0355b29127716568e12eff0e794d3f97
-
SHA1
2012882c95221a45c8ca419b03fa8a3659535139
-
SHA256
bfc01ac48222dbc93094ea1e104b50cb29911d5091b59caa9fd74f3dc183aebe
-
SHA512
76d78f96fdb44b5c7c624af4a49ea787ea4469167b626f8cc47d09a1b128aa9300a9fc07d14a4cffcc4d1af82cf52599543bf4fcb62864ab9c6a3e8b02a924fb
-
SSDEEP
12288:DMrUy90g996SGw2UQ5guNWpLCPGJciN/U9HzS+EUZxB527CAc:fyLj602wpLqw/Ug+EUzmmAc
Static task
static1
Behavioral task
behavioral1
Sample
bfc01ac48222dbc93094ea1e104b50cb29911d5091b59caa9fd74f3dc183aebe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
bfc01ac48222dbc93094ea1e104b50cb29911d5091b59caa9fd74f3dc183aebe
-
Size
658KB
-
MD5
0355b29127716568e12eff0e794d3f97
-
SHA1
2012882c95221a45c8ca419b03fa8a3659535139
-
SHA256
bfc01ac48222dbc93094ea1e104b50cb29911d5091b59caa9fd74f3dc183aebe
-
SHA512
76d78f96fdb44b5c7c624af4a49ea787ea4469167b626f8cc47d09a1b128aa9300a9fc07d14a4cffcc4d1af82cf52599543bf4fcb62864ab9c6a3e8b02a924fb
-
SSDEEP
12288:DMrUy90g996SGw2UQ5guNWpLCPGJciN/U9HzS+EUZxB527CAc:fyLj602wpLqw/Ug+EUzmmAc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1