General
-
Target
e3448b224bf42b44ca92fac82a95a5380a4fecc9c7511f8ae7fac7b3430ae6fb
-
Size
538KB
-
Sample
241106-vf4raswnep
-
MD5
8f0ccc33ed0d5c2ee0d65d31a88c88d9
-
SHA1
f1c50e78dffbede8a2edb3e8388ab8feee9eb630
-
SHA256
e3448b224bf42b44ca92fac82a95a5380a4fecc9c7511f8ae7fac7b3430ae6fb
-
SHA512
466305b7dbf15bf4c55bc293c38c8e8ddbc59a138b72afb554e8aaaf36ec94938d467a3dc534ec2888c12450d8d205561a8ebb4b64a9401ffac4679b225f78b1
-
SSDEEP
12288:HMrCy90dzuEO/OE2dxSQPsxZl+o6tGISXcDhgAo5s3lsxrv:FykuEO2E2v0xZlOtecDhnoa3lS
Static task
static1
Behavioral task
behavioral1
Sample
e3448b224bf42b44ca92fac82a95a5380a4fecc9c7511f8ae7fac7b3430ae6fb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
e3448b224bf42b44ca92fac82a95a5380a4fecc9c7511f8ae7fac7b3430ae6fb
-
Size
538KB
-
MD5
8f0ccc33ed0d5c2ee0d65d31a88c88d9
-
SHA1
f1c50e78dffbede8a2edb3e8388ab8feee9eb630
-
SHA256
e3448b224bf42b44ca92fac82a95a5380a4fecc9c7511f8ae7fac7b3430ae6fb
-
SHA512
466305b7dbf15bf4c55bc293c38c8e8ddbc59a138b72afb554e8aaaf36ec94938d467a3dc534ec2888c12450d8d205561a8ebb4b64a9401ffac4679b225f78b1
-
SSDEEP
12288:HMrCy90dzuEO/OE2dxSQPsxZl+o6tGISXcDhgAo5s3lsxrv:FykuEO2E2v0xZlOtecDhnoa3lS
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1