General
-
Target
e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c
-
Size
522KB
-
Sample
241105-z7jbwsyeka
-
MD5
1c1b97e3fc4ebc7d8ceb6f0a5123de20
-
SHA1
97e35ba7f1a99b062f9abfc3877193a81e283bba
-
SHA256
e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c
-
SHA512
a5da1dc88dba0cc2a6be977e9292c359752bd9811a1719f926044671f345de56ed8ffc4106dea2dc18dbd9b1d6b3141cd689128861a0c6a7d918f7685fcaeb74
-
SSDEEP
12288:2Mrwy90Fg++ICy8M7RGMF7OtFqJtvU5JNJsGzYTcYY:2yF+7CWR9F7uEtvIJsGzYcF
Static task
static1
Behavioral task
behavioral1
Sample
e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c
-
Size
522KB
-
MD5
1c1b97e3fc4ebc7d8ceb6f0a5123de20
-
SHA1
97e35ba7f1a99b062f9abfc3877193a81e283bba
-
SHA256
e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c
-
SHA512
a5da1dc88dba0cc2a6be977e9292c359752bd9811a1719f926044671f345de56ed8ffc4106dea2dc18dbd9b1d6b3141cd689128861a0c6a7d918f7685fcaeb74
-
SSDEEP
12288:2Mrwy90Fg++ICy8M7RGMF7OtFqJtvU5JNJsGzYTcYY:2yF+7CWR9F7uEtvIJsGzYcF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1