General
-
Target
9607b8cf512df52855c9f6d20bd9b7b3a22949f37f30fa396135a790f7311815
-
Size
546KB
-
Sample
241111-bscnsssnek
-
MD5
c8a8bfb86900c8c20975f2efc38877c6
-
SHA1
d737d91c7c8e8503007d9cb4dcb9d8332c899231
-
SHA256
9607b8cf512df52855c9f6d20bd9b7b3a22949f37f30fa396135a790f7311815
-
SHA512
47704c08f7c2df2cf9ce7362c9505c521faf44725ef07ae91fd1ac54ff7206a913d5086b0f86c2e009af4da9a2383d648b7f1aad432e081056f0b08fd5743240
-
SSDEEP
12288:PMrzy90N5hoEVF+NEeH5OvB2gpzvpfGwAcrPlgRxc+q+Wm7hj:0yQZVFSEeHkkojp+wzb8xqa
Static task
static1
Behavioral task
behavioral1
Sample
9607b8cf512df52855c9f6d20bd9b7b3a22949f37f30fa396135a790f7311815.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Targets
-
-
Target
9607b8cf512df52855c9f6d20bd9b7b3a22949f37f30fa396135a790f7311815
-
Size
546KB
-
MD5
c8a8bfb86900c8c20975f2efc38877c6
-
SHA1
d737d91c7c8e8503007d9cb4dcb9d8332c899231
-
SHA256
9607b8cf512df52855c9f6d20bd9b7b3a22949f37f30fa396135a790f7311815
-
SHA512
47704c08f7c2df2cf9ce7362c9505c521faf44725ef07ae91fd1ac54ff7206a913d5086b0f86c2e009af4da9a2383d648b7f1aad432e081056f0b08fd5743240
-
SSDEEP
12288:PMrzy90N5hoEVF+NEeH5OvB2gpzvpfGwAcrPlgRxc+q+Wm7hj:0yQZVFSEeHkkojp+wzb8xqa
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1