General
-
Target
e5980f9627c4722153d9b9332a4e59c61c7a3721ea635e375fa0f9374b87337b
-
Size
556KB
-
Sample
241110-z81ybsvmfz
-
MD5
d7c9fd0694d5819b0b582f073efede8b
-
SHA1
7be630c65692f7a2a83ca293a7274293e6b7bf74
-
SHA256
e5980f9627c4722153d9b9332a4e59c61c7a3721ea635e375fa0f9374b87337b
-
SHA512
5a3b97c48521beaa274655019a6616331fb500098d0a04a1a0c7365bdc9c88bf2f82b1bdd0467ea140b271e53482720a1e0628d957e84f118a247b3f15776b5b
-
SSDEEP
12288:rMr/y90kOUR48aeDTU3BzRFfwQgKdjoVFhq2q6R:My64vQB0YUdCg
Static task
static1
Behavioral task
behavioral1
Sample
e5980f9627c4722153d9b9332a4e59c61c7a3721ea635e375fa0f9374b87337b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Targets
-
-
Target
e5980f9627c4722153d9b9332a4e59c61c7a3721ea635e375fa0f9374b87337b
-
Size
556KB
-
MD5
d7c9fd0694d5819b0b582f073efede8b
-
SHA1
7be630c65692f7a2a83ca293a7274293e6b7bf74
-
SHA256
e5980f9627c4722153d9b9332a4e59c61c7a3721ea635e375fa0f9374b87337b
-
SHA512
5a3b97c48521beaa274655019a6616331fb500098d0a04a1a0c7365bdc9c88bf2f82b1bdd0467ea140b271e53482720a1e0628d957e84f118a247b3f15776b5b
-
SSDEEP
12288:rMr/y90kOUR48aeDTU3BzRFfwQgKdjoVFhq2q6R:My64vQB0YUdCg
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1