General
-
Target
e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c
-
Size
559KB
-
Sample
241111-c7xg7azpbz
-
MD5
6e98f4137ff00a17797f3bd256ef4695
-
SHA1
d37295610102bfca21c449e0da66cf996368f12a
-
SHA256
e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c
-
SHA512
f7ff390dafb25011904d07af00d3f90e2577c9af7202152d5c44416d0f616096fd03f0c2c2c80b583585e117c3edc56cdc341e7d69d3b3f9ec99f2dca0a30157
-
SSDEEP
12288:qMrSy90noxlNbclS+gf10eF+PW+320DDd4aO:cyXlVwSBfsPWAtDDyaO
Static task
static1
Behavioral task
behavioral1
Sample
e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c
-
Size
559KB
-
MD5
6e98f4137ff00a17797f3bd256ef4695
-
SHA1
d37295610102bfca21c449e0da66cf996368f12a
-
SHA256
e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c
-
SHA512
f7ff390dafb25011904d07af00d3f90e2577c9af7202152d5c44416d0f616096fd03f0c2c2c80b583585e117c3edc56cdc341e7d69d3b3f9ec99f2dca0a30157
-
SSDEEP
12288:qMrSy90noxlNbclS+gf10eF+PW+320DDd4aO:cyXlVwSBfsPWAtDDyaO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1