General
-
Target
e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951
-
Size
666KB
-
Sample
241105-n8nr8a1fqq
-
MD5
bce6dad9fadcc0922d380a4745dbebf3
-
SHA1
1cd9363e5ad94f37afe1b311452bc1a4ae785b0b
-
SHA256
e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951
-
SHA512
87a24ff90af08a8a9dfaf4f0243f3c305f9f12cb56719862f6a3ff7c74cc94e7f0c66e31f7b3375402aec91c3372274b5aac4f1ca8b4b1292f2ecdfcdc2487b6
-
SSDEEP
12288:aMrAy90TuZpH1OnM/5yFyo2UTrmlISqv2ORhT+6He8mo/ip7QoHppC:+ylZoz2+mlOHDTe7ZQuC
Static task
static1
Behavioral task
behavioral1
Sample
e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951
-
Size
666KB
-
MD5
bce6dad9fadcc0922d380a4745dbebf3
-
SHA1
1cd9363e5ad94f37afe1b311452bc1a4ae785b0b
-
SHA256
e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951
-
SHA512
87a24ff90af08a8a9dfaf4f0243f3c305f9f12cb56719862f6a3ff7c74cc94e7f0c66e31f7b3375402aec91c3372274b5aac4f1ca8b4b1292f2ecdfcdc2487b6
-
SSDEEP
12288:aMrAy90TuZpH1OnM/5yFyo2UTrmlISqv2ORhT+6He8mo/ip7QoHppC:+ylZoz2+mlOHDTe7ZQuC
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1