General
-
Target
903bf0e6c779503b8de39bf3791967dbd9dad7dbb339fc178d5f34733882fa05
-
Size
531KB
-
Sample
241111-bsl78syhnj
-
MD5
fb9045cfdb863c373287ebb09f997e4e
-
SHA1
f590ce43f4b81ca2c662c2ccb891903a9cfaee12
-
SHA256
903bf0e6c779503b8de39bf3791967dbd9dad7dbb339fc178d5f34733882fa05
-
SHA512
39ae9bc35d75371368c3a49604d4c8a1ea63d29d0141f48201eb7d825e45102dc3ca3f25e1f3e5eed69253f4afcb8c05a60c1028b7af2c497192188421841468
-
SSDEEP
12288:PMr+y90V/ACE/ytCxh4gs7Js38AXkAxj1QpqBSyREsYt:pyak/14g1/ZQYbasYt
Static task
static1
Behavioral task
behavioral1
Sample
903bf0e6c779503b8de39bf3791967dbd9dad7dbb339fc178d5f34733882fa05.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
903bf0e6c779503b8de39bf3791967dbd9dad7dbb339fc178d5f34733882fa05
-
Size
531KB
-
MD5
fb9045cfdb863c373287ebb09f997e4e
-
SHA1
f590ce43f4b81ca2c662c2ccb891903a9cfaee12
-
SHA256
903bf0e6c779503b8de39bf3791967dbd9dad7dbb339fc178d5f34733882fa05
-
SHA512
39ae9bc35d75371368c3a49604d4c8a1ea63d29d0141f48201eb7d825e45102dc3ca3f25e1f3e5eed69253f4afcb8c05a60c1028b7af2c497192188421841468
-
SSDEEP
12288:PMr+y90V/ACE/ytCxh4gs7Js38AXkAxj1QpqBSyREsYt:pyak/14g1/ZQYbasYt
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1