General
-
Target
bd28d8efd43da0202bc87b677c9d28bdcf09e06ab225d3652751df2f3abb1cfd
-
Size
660KB
-
Sample
241110-2dt8eaxbqg
-
MD5
e340f04c4850b60cf3a8dbd14fe58304
-
SHA1
4177e5e2a53431149594d61a033b90efa919ddd2
-
SHA256
bd28d8efd43da0202bc87b677c9d28bdcf09e06ab225d3652751df2f3abb1cfd
-
SHA512
19bae8ca98cf1989d52020bbbc154a21c781a5898a5dc5381b01ab39e1290486c220881608991d77433ff9432eeddf3bb3e5762ced2b8b128ff54d4c7aa64323
-
SSDEEP
12288:wMrAy90Vnyn8BgqPpPh5aNhv85P/c2x0QFyy6zrTmcSQMBHQsY17t:gyGnG8x9h52hE5Xr+9y6zrThqBwsyt
Static task
static1
Behavioral task
behavioral1
Sample
bd28d8efd43da0202bc87b677c9d28bdcf09e06ab225d3652751df2f3abb1cfd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
bd28d8efd43da0202bc87b677c9d28bdcf09e06ab225d3652751df2f3abb1cfd
-
Size
660KB
-
MD5
e340f04c4850b60cf3a8dbd14fe58304
-
SHA1
4177e5e2a53431149594d61a033b90efa919ddd2
-
SHA256
bd28d8efd43da0202bc87b677c9d28bdcf09e06ab225d3652751df2f3abb1cfd
-
SHA512
19bae8ca98cf1989d52020bbbc154a21c781a5898a5dc5381b01ab39e1290486c220881608991d77433ff9432eeddf3bb3e5762ced2b8b128ff54d4c7aa64323
-
SSDEEP
12288:wMrAy90Vnyn8BgqPpPh5aNhv85P/c2x0QFyy6zrTmcSQMBHQsY17t:gyGnG8x9h52hE5Xr+9y6zrThqBwsyt
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1