General
-
Target
bb60324f9237f03471f84b8e06eec7ce5364f2c1ef4d84d3f3998d3cff17850c
-
Size
539KB
-
Sample
241110-z58h1avgjq
-
MD5
318d70b878b37f011184460a20e5c748
-
SHA1
3a1299663b02c97742be6b190e4388da40738c2e
-
SHA256
bb60324f9237f03471f84b8e06eec7ce5364f2c1ef4d84d3f3998d3cff17850c
-
SHA512
84c2caa604d6a731c9e86c7f360dc8da88b32a8d1fe7183170fe418ce5f0e6edc495d81b1a9674a9bfd9241013129233c4511fd406c3b436e18804ce4eba692e
-
SSDEEP
12288:/MrQy90wCTQO7J7SH7RvaaHDun1M4AvKHMijd:LyCTT6VhaAvCd
Static task
static1
Behavioral task
behavioral1
Sample
bb60324f9237f03471f84b8e06eec7ce5364f2c1ef4d84d3f3998d3cff17850c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
bb60324f9237f03471f84b8e06eec7ce5364f2c1ef4d84d3f3998d3cff17850c
-
Size
539KB
-
MD5
318d70b878b37f011184460a20e5c748
-
SHA1
3a1299663b02c97742be6b190e4388da40738c2e
-
SHA256
bb60324f9237f03471f84b8e06eec7ce5364f2c1ef4d84d3f3998d3cff17850c
-
SHA512
84c2caa604d6a731c9e86c7f360dc8da88b32a8d1fe7183170fe418ce5f0e6edc495d81b1a9674a9bfd9241013129233c4511fd406c3b436e18804ce4eba692e
-
SSDEEP
12288:/MrQy90wCTQO7J7SH7RvaaHDun1M4AvKHMijd:LyCTT6VhaAvCd
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1