General
-
Target
efea926ab06a557fc7a882947ac280d2088919ff1963b7e10da0863566ca9c73
-
Size
673KB
-
Sample
241105-w6z2gavqh1
-
MD5
a6d25ba0758664d8144d482846ec3e65
-
SHA1
d6cefec7c2fe13c8c9acbd6259927dac4f522cd2
-
SHA256
efea926ab06a557fc7a882947ac280d2088919ff1963b7e10da0863566ca9c73
-
SHA512
32ec68500c874d3f8b14bf9748341bd4332e3b24b888b1b9d493f0f3918d46cdb145f2f51aa017cb0732dcb9384b97c6e53ccac91f1ea3a9305ead9f819337d3
-
SSDEEP
12288:bMrgy90SHBkWbm9bSc2UR0qEGv7HQLj6mbuWULxn0mbw9ZF:/ybHBvmndRFv7w3TuTamb+ZF
Static task
static1
Behavioral task
behavioral1
Sample
efea926ab06a557fc7a882947ac280d2088919ff1963b7e10da0863566ca9c73.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
efea926ab06a557fc7a882947ac280d2088919ff1963b7e10da0863566ca9c73
-
Size
673KB
-
MD5
a6d25ba0758664d8144d482846ec3e65
-
SHA1
d6cefec7c2fe13c8c9acbd6259927dac4f522cd2
-
SHA256
efea926ab06a557fc7a882947ac280d2088919ff1963b7e10da0863566ca9c73
-
SHA512
32ec68500c874d3f8b14bf9748341bd4332e3b24b888b1b9d493f0f3918d46cdb145f2f51aa017cb0732dcb9384b97c6e53ccac91f1ea3a9305ead9f819337d3
-
SSDEEP
12288:bMrgy90SHBkWbm9bSc2UR0qEGv7HQLj6mbuWULxn0mbw9ZF:/ybHBvmndRFv7w3TuTamb+ZF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1