General
-
Target
eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe
-
Size
537KB
-
Sample
241106-jxxhrsxbkl
-
MD5
129f580e2f1271882076e26877cb4a28
-
SHA1
f3f4499df38c0b8590ff45d65c9466182c1ed12b
-
SHA256
eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe
-
SHA512
4740571038e0535d0ff525786a76c7cc9d621a8d34b7c624e9cbf2c4ee2d98c5c22f01aa1bb053041de753df8c291d22a86f7c69c2832712173df49ef35e2dcc
-
SSDEEP
12288:HMrMy90zmntMTU42nBMD4EuBwC+59OJUFaeo78C:TyttMBx4Eu30jm
Static task
static1
Behavioral task
behavioral1
Sample
eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe
-
Size
537KB
-
MD5
129f580e2f1271882076e26877cb4a28
-
SHA1
f3f4499df38c0b8590ff45d65c9466182c1ed12b
-
SHA256
eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe
-
SHA512
4740571038e0535d0ff525786a76c7cc9d621a8d34b7c624e9cbf2c4ee2d98c5c22f01aa1bb053041de753df8c291d22a86f7c69c2832712173df49ef35e2dcc
-
SSDEEP
12288:HMrMy90zmntMTU42nBMD4EuBwC+59OJUFaeo78C:TyttMBx4Eu30jm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1