General
-
Target
e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea
-
Size
537KB
-
Sample
241106-vy2dwswrck
-
MD5
fa115b77f6c81a801bef8a6a8c099d3d
-
SHA1
cd4b36ecee907e5f71ff2cbedfbdc56e6bb31054
-
SHA256
e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea
-
SHA512
229cab5bf9ae0a12e054ec7ecbd96c84446a4bb37e6a15632d9256114a0a9408ac62953cb03c40394a9c4662e66babb4d730a71c51f9f26862cdcfc5f09c0f3d
-
SSDEEP
12288:UMrny90BcPGgxzTrivCyD0v8I9HoIILjvSK1y8jkVa:ryxPGcGvCD8so5LjaKZB
Static task
static1
Behavioral task
behavioral1
Sample
e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea
-
Size
537KB
-
MD5
fa115b77f6c81a801bef8a6a8c099d3d
-
SHA1
cd4b36ecee907e5f71ff2cbedfbdc56e6bb31054
-
SHA256
e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea
-
SHA512
229cab5bf9ae0a12e054ec7ecbd96c84446a4bb37e6a15632d9256114a0a9408ac62953cb03c40394a9c4662e66babb4d730a71c51f9f26862cdcfc5f09c0f3d
-
SSDEEP
12288:UMrny90BcPGgxzTrivCyD0v8I9HoIILjvSK1y8jkVa:ryxPGcGvCD8so5LjaKZB
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1