General
-
Target
e1c0f272e29d18d5b83393e5a1ade34acd77c21034500d0fc4c52de8ade80122
-
Size
696KB
-
Sample
241105-yaef1axanb
-
MD5
990b93dc7ddf3b390ac985c6882126f0
-
SHA1
496409551e7fed96ac093fbd7e7b9c51965f4817
-
SHA256
e1c0f272e29d18d5b83393e5a1ade34acd77c21034500d0fc4c52de8ade80122
-
SHA512
947641febcc97177310364524a87b04095e8995e11a86b985060deae5d74247c0fe6241f851f8134706d91b9b405af9276d271dce756e41f38e3a8f781ea255e
-
SSDEEP
12288:8MrZy90VrvrcECz3NBB9GS37EYzl69/jFIrpbN0ySVRWMDzcrknjFfd4SNj:tyWvgr9BB9LEYzl6FFg+ywc6HPj
Static task
static1
Behavioral task
behavioral1
Sample
e1c0f272e29d18d5b83393e5a1ade34acd77c21034500d0fc4c52de8ade80122.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
e1c0f272e29d18d5b83393e5a1ade34acd77c21034500d0fc4c52de8ade80122
-
Size
696KB
-
MD5
990b93dc7ddf3b390ac985c6882126f0
-
SHA1
496409551e7fed96ac093fbd7e7b9c51965f4817
-
SHA256
e1c0f272e29d18d5b83393e5a1ade34acd77c21034500d0fc4c52de8ade80122
-
SHA512
947641febcc97177310364524a87b04095e8995e11a86b985060deae5d74247c0fe6241f851f8134706d91b9b405af9276d271dce756e41f38e3a8f781ea255e
-
SSDEEP
12288:8MrZy90VrvrcECz3NBB9GS37EYzl69/jFIrpbN0ySVRWMDzcrknjFfd4SNj:tyWvgr9BB9LEYzl6FFg+ywc6HPj
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1