General
-
Target
eb2796e4883f6f7a587a4e879635e6b913a3353cd73c2368313729e4b906c9e1
-
Size
530KB
-
Sample
241104-q13mhstjbr
-
MD5
605144475b405341269e44db1425e084
-
SHA1
ac444571b2910f6ea084ba687810e6612694e992
-
SHA256
eb2796e4883f6f7a587a4e879635e6b913a3353cd73c2368313729e4b906c9e1
-
SHA512
a1a330fa472b50e53fa3349989f73ab835ed1b94b4be9b78565b158f643582b8e55c3afad1c8578e0a1f7264aeff43056f39ef7f16ddfc34496ddf0f2a8856ff
-
SSDEEP
12288:RMrwy90oIsNOWKrIu4f5KXa/dmmjjs85Rm/8e:VyDO9ILA+mmXs85RQ8e
Static task
static1
Behavioral task
behavioral1
Sample
eb2796e4883f6f7a587a4e879635e6b913a3353cd73c2368313729e4b906c9e1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
eb2796e4883f6f7a587a4e879635e6b913a3353cd73c2368313729e4b906c9e1
-
Size
530KB
-
MD5
605144475b405341269e44db1425e084
-
SHA1
ac444571b2910f6ea084ba687810e6612694e992
-
SHA256
eb2796e4883f6f7a587a4e879635e6b913a3353cd73c2368313729e4b906c9e1
-
SHA512
a1a330fa472b50e53fa3349989f73ab835ed1b94b4be9b78565b158f643582b8e55c3afad1c8578e0a1f7264aeff43056f39ef7f16ddfc34496ddf0f2a8856ff
-
SSDEEP
12288:RMrwy90oIsNOWKrIu4f5KXa/dmmjjs85Rm/8e:VyDO9ILA+mmXs85RQ8e
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1