General
-
Target
e500e139e893b38b039c58aec727b179525c16c3b6e87fa325b15c5c511bf596
-
Size
535KB
-
Sample
241111-ae65taxmet
-
MD5
ef89218e77760667ffa06a9c0b3058e3
-
SHA1
4ce0c7f1aa9ff24db790395d379ed3337c4816df
-
SHA256
e500e139e893b38b039c58aec727b179525c16c3b6e87fa325b15c5c511bf596
-
SHA512
6eb9d4fb4960fde4d2bbd57211abc882190e0f93b86aa317a5c3d2e67091a654ae35423fa5e0e5781fd2797fcc810857a7c5e6b9db3d293483527b32cc898993
-
SSDEEP
12288:MMroy90BlXsKFO8O7ou+UQUDKei00e02S21bY31t0d:syZKFlOqei00ehc31t0d
Static task
static1
Behavioral task
behavioral1
Sample
e500e139e893b38b039c58aec727b179525c16c3b6e87fa325b15c5c511bf596.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Targets
-
-
Target
e500e139e893b38b039c58aec727b179525c16c3b6e87fa325b15c5c511bf596
-
Size
535KB
-
MD5
ef89218e77760667ffa06a9c0b3058e3
-
SHA1
4ce0c7f1aa9ff24db790395d379ed3337c4816df
-
SHA256
e500e139e893b38b039c58aec727b179525c16c3b6e87fa325b15c5c511bf596
-
SHA512
6eb9d4fb4960fde4d2bbd57211abc882190e0f93b86aa317a5c3d2e67091a654ae35423fa5e0e5781fd2797fcc810857a7c5e6b9db3d293483527b32cc898993
-
SSDEEP
12288:MMroy90BlXsKFO8O7ou+UQUDKei00e02S21bY31t0d:syZKFlOqei00ehc31t0d
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1