General
-
Target
e7ba1c42fc35b3975379d56baf47168fbb2e213cffc192905bbff0b4becac54e
-
Size
1.3MB
-
Sample
241111-afjqxa1mhm
-
MD5
5035fc58fbe7e96a052c89109493399f
-
SHA1
5cf34d42aa18f59c0014d1c6c8e379dc9cdccc5b
-
SHA256
e7ba1c42fc35b3975379d56baf47168fbb2e213cffc192905bbff0b4becac54e
-
SHA512
64babc5e6f30337e74e40d4b0e78a9066d53c5ac5a0968f27e5b4e29581f79dc3f49dc9908798669e1c69136441e76f1209893bf221efa650b3157a3d3b5eca0
-
SSDEEP
24576:NymCVVkL7tqqD+YxtaY9UOKFwsgYo7eF4cmr5muoM97zh69UTvo:oXV6LZqqDUY9UOKFwsgY74/r5PHGU
Static task
static1
Behavioral task
behavioral1
Sample
e7ba1c42fc35b3975379d56baf47168fbb2e213cffc192905bbff0b4becac54e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Targets
-
-
Target
e7ba1c42fc35b3975379d56baf47168fbb2e213cffc192905bbff0b4becac54e
-
Size
1.3MB
-
MD5
5035fc58fbe7e96a052c89109493399f
-
SHA1
5cf34d42aa18f59c0014d1c6c8e379dc9cdccc5b
-
SHA256
e7ba1c42fc35b3975379d56baf47168fbb2e213cffc192905bbff0b4becac54e
-
SHA512
64babc5e6f30337e74e40d4b0e78a9066d53c5ac5a0968f27e5b4e29581f79dc3f49dc9908798669e1c69136441e76f1209893bf221efa650b3157a3d3b5eca0
-
SSDEEP
24576:NymCVVkL7tqqD+YxtaY9UOKFwsgYo7eF4cmr5muoM97zh69UTvo:oXV6LZqqDUY9UOKFwsgY74/r5PHGU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1