General
-
Target
e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7N.exe
-
Size
700KB
-
Sample
241110-z5bh9svfrl
-
MD5
3041cf4ba62370e15b60f3bf1aef2630
-
SHA1
f89aabf700f01a2cb6a3cdc9800605c6bcc98cc8
-
SHA256
2dbecaaf91947f3b35dd524cff4475fe051f09df1e5b2d2237df492f9f2cafb2
-
SHA512
cbac4e5e191781d0a6fc29ab228a47196f9a3954c888d8e933cd8f34703f5e9f06290e9d1bb78219fe27ea0bc4bd6007242fb855b438f7d4b898ea8ffc2cf568
-
SSDEEP
12288:QMr5y90eEWEB17CYU9DAMcACNIfNTQ3C2qX4JFywP7azru0yl:5yGEffZLspGbyl
Static task
static1
Behavioral task
behavioral1
Sample
e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7N.exe
-
Size
700KB
-
MD5
3041cf4ba62370e15b60f3bf1aef2630
-
SHA1
f89aabf700f01a2cb6a3cdc9800605c6bcc98cc8
-
SHA256
2dbecaaf91947f3b35dd524cff4475fe051f09df1e5b2d2237df492f9f2cafb2
-
SHA512
cbac4e5e191781d0a6fc29ab228a47196f9a3954c888d8e933cd8f34703f5e9f06290e9d1bb78219fe27ea0bc4bd6007242fb855b438f7d4b898ea8ffc2cf568
-
SSDEEP
12288:QMr5y90eEWEB17CYU9DAMcACNIfNTQ3C2qX4JFywP7azru0yl:5yGEffZLspGbyl
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1