General
-
Target
ec727ade0769d5af0797c00b2f514cca2a69ff5b291ade6b50de46e6a9d90bc9
-
Size
548KB
-
Sample
241110-2d7hqszmal
-
MD5
bcfb9fb8af0080a6c9efe6c8df9724a4
-
SHA1
e8bb5f869e2d6e54baa6a3e0254f00fb16afef5e
-
SHA256
ec727ade0769d5af0797c00b2f514cca2a69ff5b291ade6b50de46e6a9d90bc9
-
SHA512
938fb096349286684c9e86187827e62235020304ae1f41f3436800731bea98f9f1260bd097659dfe960a2124bb38ce065feb02c7ad057528d4b83b46708fdae6
-
SSDEEP
12288:gMrCy90jj85sKN/EFuJu6RdXk3Stz1Zkw5eHI:yygjDEEcJu60C1m1HI
Static task
static1
Behavioral task
behavioral1
Sample
ec727ade0769d5af0797c00b2f514cca2a69ff5b291ade6b50de46e6a9d90bc9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
ec727ade0769d5af0797c00b2f514cca2a69ff5b291ade6b50de46e6a9d90bc9
-
Size
548KB
-
MD5
bcfb9fb8af0080a6c9efe6c8df9724a4
-
SHA1
e8bb5f869e2d6e54baa6a3e0254f00fb16afef5e
-
SHA256
ec727ade0769d5af0797c00b2f514cca2a69ff5b291ade6b50de46e6a9d90bc9
-
SHA512
938fb096349286684c9e86187827e62235020304ae1f41f3436800731bea98f9f1260bd097659dfe960a2124bb38ce065feb02c7ad057528d4b83b46708fdae6
-
SSDEEP
12288:gMrCy90jj85sKN/EFuJu6RdXk3Stz1Zkw5eHI:yygjDEEcJu60C1m1HI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1