General
-
Target
ec28f8cda3e1707dcfc85130df79c60155a739d8372ca2ee20f5b80c4d0432e4
-
Size
666KB
-
Sample
241106-nh2lds1qeq
-
MD5
bcefe1ce3853c7fdb5897cc0b4ba31c5
-
SHA1
57f824d33bddc79e5615420f3d19314dfb77f583
-
SHA256
ec28f8cda3e1707dcfc85130df79c60155a739d8372ca2ee20f5b80c4d0432e4
-
SHA512
db9e9c055ff36d83e9923ffe8ecdcb71c967f44fe7ac7c4c956786f52ada0fffa05849bdb0ff962edd422b5f4fa860cc5bd20d5ff38c8d72bcc4b8a58ad8b676
-
SSDEEP
12288:AMr2y90G5wvjwpsVvOOf8XNOt67grouNPpyT+uMmcrU0yH/wbUx7T:myvpUyXNOsg9H7mcrYfwY5T
Static task
static1
Behavioral task
behavioral1
Sample
ec28f8cda3e1707dcfc85130df79c60155a739d8372ca2ee20f5b80c4d0432e4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
ec28f8cda3e1707dcfc85130df79c60155a739d8372ca2ee20f5b80c4d0432e4
-
Size
666KB
-
MD5
bcefe1ce3853c7fdb5897cc0b4ba31c5
-
SHA1
57f824d33bddc79e5615420f3d19314dfb77f583
-
SHA256
ec28f8cda3e1707dcfc85130df79c60155a739d8372ca2ee20f5b80c4d0432e4
-
SHA512
db9e9c055ff36d83e9923ffe8ecdcb71c967f44fe7ac7c4c956786f52ada0fffa05849bdb0ff962edd422b5f4fa860cc5bd20d5ff38c8d72bcc4b8a58ad8b676
-
SSDEEP
12288:AMr2y90G5wvjwpsVvOOf8XNOt67grouNPpyT+uMmcrU0yH/wbUx7T:myvpUyXNOsg9H7mcrYfwY5T
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1