General
-
Target
2b1529ddb65bd5239efc18351c5c147cead71c022b9afc0578a9509e90420c03
-
Size
658KB
-
Sample
241111-c4tl5aznc1
-
MD5
8e230f88842fd39cfe6dace5acf9202b
-
SHA1
0152e6d852038e0a94bbe75d9b403550e51fe42e
-
SHA256
2b1529ddb65bd5239efc18351c5c147cead71c022b9afc0578a9509e90420c03
-
SHA512
14b26998f1ff3c741518b51ec090c7a68dcc9c681dc792b5326fe88884ef9680b16a9762146ab4f098aa1c228d2bf9cc64041d52ee7572c6387cefe20b7bdda7
-
SSDEEP
12288:OMrAy90ph513BJcWvnjS9ohUPTqjpf028R+gO/2JxjYZIY:6yhAnnYq1a+1/2TE
Static task
static1
Behavioral task
behavioral1
Sample
2b1529ddb65bd5239efc18351c5c147cead71c022b9afc0578a9509e90420c03.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
2b1529ddb65bd5239efc18351c5c147cead71c022b9afc0578a9509e90420c03
-
Size
658KB
-
MD5
8e230f88842fd39cfe6dace5acf9202b
-
SHA1
0152e6d852038e0a94bbe75d9b403550e51fe42e
-
SHA256
2b1529ddb65bd5239efc18351c5c147cead71c022b9afc0578a9509e90420c03
-
SHA512
14b26998f1ff3c741518b51ec090c7a68dcc9c681dc792b5326fe88884ef9680b16a9762146ab4f098aa1c228d2bf9cc64041d52ee7572c6387cefe20b7bdda7
-
SSDEEP
12288:OMrAy90ph513BJcWvnjS9ohUPTqjpf028R+gO/2JxjYZIY:6yhAnnYq1a+1/2TE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1