General
-
Target
f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8
-
Size
690KB
-
Sample
241111-cf9nfazejq
-
MD5
b3292a8356a01b927c95d1655d48c706
-
SHA1
b09d9a1491b9fdd91606791e1c8a13aa555530ef
-
SHA256
f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8
-
SHA512
bbdfa56192a310d1e21adc64157da82f41f3d81ecc987862b8aa2f2b5a821e5e836acfceb959e73d4f6281543dc46b6a2223751306f489620e772e80c9a76a20
-
SSDEEP
12288:FMrwy90g9JkRVqrSWxXl7kipnaCv4p8LvW/16PZhqsjHGK2yJ4:9yfYRipnj7lhryxv
Static task
static1
Behavioral task
behavioral1
Sample
f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8
-
Size
690KB
-
MD5
b3292a8356a01b927c95d1655d48c706
-
SHA1
b09d9a1491b9fdd91606791e1c8a13aa555530ef
-
SHA256
f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8
-
SHA512
bbdfa56192a310d1e21adc64157da82f41f3d81ecc987862b8aa2f2b5a821e5e836acfceb959e73d4f6281543dc46b6a2223751306f489620e772e80c9a76a20
-
SSDEEP
12288:FMrwy90g9JkRVqrSWxXl7kipnaCv4p8LvW/16PZhqsjHGK2yJ4:9yfYRipnj7lhryxv
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1