General
-
Target
ea5f3910ec718515cedcb086ff94d34cd28b537444e17d88b030e6d9e7fcc050
-
Size
686KB
-
Sample
241109-fk3x8s1kdr
-
MD5
7855052bb225e19008fc9bf9c0407536
-
SHA1
fed255c06290826ccaed117b6f63fbe6c551c61e
-
SHA256
ea5f3910ec718515cedcb086ff94d34cd28b537444e17d88b030e6d9e7fcc050
-
SHA512
ac8ff9d27fb7aaa1675ec2a0e61d9e9968ec85d865c105ffdf300f6429e55bd6a2962dbf949d3fb884850d44b1c031b7345fb5e5f0c8e68be0811a39f921f31e
-
SSDEEP
12288:1MrNy90QnlJJ74hiDS4REfKYEMtAhuJldvbuoJ0y7VTICninw0aNvW10gn:UyN98iWBfcGAgzJ0ZuiFauFn
Static task
static1
Behavioral task
behavioral1
Sample
ea5f3910ec718515cedcb086ff94d34cd28b537444e17d88b030e6d9e7fcc050.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
ea5f3910ec718515cedcb086ff94d34cd28b537444e17d88b030e6d9e7fcc050
-
Size
686KB
-
MD5
7855052bb225e19008fc9bf9c0407536
-
SHA1
fed255c06290826ccaed117b6f63fbe6c551c61e
-
SHA256
ea5f3910ec718515cedcb086ff94d34cd28b537444e17d88b030e6d9e7fcc050
-
SHA512
ac8ff9d27fb7aaa1675ec2a0e61d9e9968ec85d865c105ffdf300f6429e55bd6a2962dbf949d3fb884850d44b1c031b7345fb5e5f0c8e68be0811a39f921f31e
-
SSDEEP
12288:1MrNy90QnlJJ74hiDS4REfKYEMtAhuJldvbuoJ0y7VTICninw0aNvW10gn:UyN98iWBfcGAgzJ0ZuiFauFn
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1