General
-
Target
b8721cef3f7834a321f2f020b22103cc18a22ef2f17cbb312f1b2d7b8bb1b4c4
-
Size
667KB
-
Sample
241106-tsatbatcmb
-
MD5
760b21975bd47f04402164965bf3fdd4
-
SHA1
cb16e736994704f14ba7c1fbe3aa36a9dc6ff624
-
SHA256
b8721cef3f7834a321f2f020b22103cc18a22ef2f17cbb312f1b2d7b8bb1b4c4
-
SHA512
88e808766b0a7c53cedd743a1b4200e48cb9d959121b61f8c6d5c8662d914905c857b8439f38e27954746acfeaf36e1001c8f4ab3cecd109b53d83a117623530
-
SSDEEP
12288:pMrwy901SnvrhgMVGTlUHI8H93iKxslk4t1JtbFqwk4u2cgNBR01SI:hyPuOICMk4HJtbUHVgNBR01SI
Static task
static1
Behavioral task
behavioral1
Sample
b8721cef3f7834a321f2f020b22103cc18a22ef2f17cbb312f1b2d7b8bb1b4c4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
b8721cef3f7834a321f2f020b22103cc18a22ef2f17cbb312f1b2d7b8bb1b4c4
-
Size
667KB
-
MD5
760b21975bd47f04402164965bf3fdd4
-
SHA1
cb16e736994704f14ba7c1fbe3aa36a9dc6ff624
-
SHA256
b8721cef3f7834a321f2f020b22103cc18a22ef2f17cbb312f1b2d7b8bb1b4c4
-
SHA512
88e808766b0a7c53cedd743a1b4200e48cb9d959121b61f8c6d5c8662d914905c857b8439f38e27954746acfeaf36e1001c8f4ab3cecd109b53d83a117623530
-
SSDEEP
12288:pMrwy901SnvrhgMVGTlUHI8H93iKxslk4t1JtbFqwk4u2cgNBR01SI:hyPuOICMk4HJtbUHVgNBR01SI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1