General
-
Target
eb4dff917f9fe908a2c08a0d93a07e3e8bd2aba0f5940565adabce5c824b1234
-
Size
925KB
-
Sample
241105-28y5va1frq
-
MD5
1cbf170e97c42747cab93c3afa52c5c6
-
SHA1
56c889a3f8e9fbd870fe3c1e7a3c0475c0b22d8e
-
SHA256
eb4dff917f9fe908a2c08a0d93a07e3e8bd2aba0f5940565adabce5c824b1234
-
SHA512
5711a1df6a2807957ec94d6fec5103232df2256bfbea3793aa73b8bf31a3c60488b730fe291478c2c5b04f05a79d037e884e5b5e8fba6f1f4a589cfb3908c106
-
SSDEEP
12288:/Mrqy903G0dUF9u/gQ+mI7SD0s+2Ml3cNI+Xn+iRYmk86r/rlg70hULqS:Vy/Q8JJqpnfYV270hUGS
Static task
static1
Behavioral task
behavioral1
Sample
eb4dff917f9fe908a2c08a0d93a07e3e8bd2aba0f5940565adabce5c824b1234.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
eb4dff917f9fe908a2c08a0d93a07e3e8bd2aba0f5940565adabce5c824b1234
-
Size
925KB
-
MD5
1cbf170e97c42747cab93c3afa52c5c6
-
SHA1
56c889a3f8e9fbd870fe3c1e7a3c0475c0b22d8e
-
SHA256
eb4dff917f9fe908a2c08a0d93a07e3e8bd2aba0f5940565adabce5c824b1234
-
SHA512
5711a1df6a2807957ec94d6fec5103232df2256bfbea3793aa73b8bf31a3c60488b730fe291478c2c5b04f05a79d037e884e5b5e8fba6f1f4a589cfb3908c106
-
SSDEEP
12288:/Mrqy903G0dUF9u/gQ+mI7SD0s+2Ml3cNI+Xn+iRYmk86r/rlg70hULqS:Vy/Q8JJqpnfYV270hUGS
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1