General
-
Target
2bffc9b6a7cf1c7835209c66455df16ec69f8d76318128b4db0d174965433a29
-
Size
530KB
-
Sample
241109-zcgjta1hrl
-
MD5
a0669d20016ba02e25ccbaa85e08c304
-
SHA1
da4baf5d7bf00163de3807b780c21459cbfa3d81
-
SHA256
2bffc9b6a7cf1c7835209c66455df16ec69f8d76318128b4db0d174965433a29
-
SHA512
982ba3c13a74e017756cf9f2189d6288e1901d963ebab431539456201bd0e8a299d1cec01ec4955ff5d2a03873a97154525c5de3a441a90fdf67304b2cc428d0
-
SSDEEP
12288:EMr8y90aMG1MtDoU45y3fZp3tif5KXa/5mr8L+sD4RKM:Qyao356xWAamr8L+i41
Static task
static1
Behavioral task
behavioral1
Sample
2bffc9b6a7cf1c7835209c66455df16ec69f8d76318128b4db0d174965433a29.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
2bffc9b6a7cf1c7835209c66455df16ec69f8d76318128b4db0d174965433a29
-
Size
530KB
-
MD5
a0669d20016ba02e25ccbaa85e08c304
-
SHA1
da4baf5d7bf00163de3807b780c21459cbfa3d81
-
SHA256
2bffc9b6a7cf1c7835209c66455df16ec69f8d76318128b4db0d174965433a29
-
SHA512
982ba3c13a74e017756cf9f2189d6288e1901d963ebab431539456201bd0e8a299d1cec01ec4955ff5d2a03873a97154525c5de3a441a90fdf67304b2cc428d0
-
SSDEEP
12288:EMr8y90aMG1MtDoU45y3fZp3tif5KXa/5mr8L+sD4RKM:Qyao356xWAamr8L+i41
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1