General
-
Target
e25b7d76cc862dd6fd106c1cdbf29bd5c81cb7d1fbc2e9a45fc195fd62dc93fc
-
Size
479KB
-
Sample
241111-eps36awkhl
-
MD5
91ff9d71403424485cb589d4777b4bc2
-
SHA1
8d4748a03c9f3eb759bc1322b786d7fc2b12af40
-
SHA256
e25b7d76cc862dd6fd106c1cdbf29bd5c81cb7d1fbc2e9a45fc195fd62dc93fc
-
SHA512
12e8ec8d3c9d400396107a8848e86375be67f8c2c6d9f7e4aed4816097a6fad13f98b86e7c478fc7abd428d2d322e3f7a6d9b4d7e0c151690cd72c70038c106e
-
SSDEEP
12288:hMrUy903aDqkWHKiEjJ/N+mWv4T+QQJ/4pNLFtmN7iO17i9/Y:Ny9iTEpNSQO17P
Static task
static1
Behavioral task
behavioral1
Sample
e25b7d76cc862dd6fd106c1cdbf29bd5c81cb7d1fbc2e9a45fc195fd62dc93fc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Targets
-
-
Target
e25b7d76cc862dd6fd106c1cdbf29bd5c81cb7d1fbc2e9a45fc195fd62dc93fc
-
Size
479KB
-
MD5
91ff9d71403424485cb589d4777b4bc2
-
SHA1
8d4748a03c9f3eb759bc1322b786d7fc2b12af40
-
SHA256
e25b7d76cc862dd6fd106c1cdbf29bd5c81cb7d1fbc2e9a45fc195fd62dc93fc
-
SHA512
12e8ec8d3c9d400396107a8848e86375be67f8c2c6d9f7e4aed4816097a6fad13f98b86e7c478fc7abd428d2d322e3f7a6d9b4d7e0c151690cd72c70038c106e
-
SSDEEP
12288:hMrUy903aDqkWHKiEjJ/N+mWv4T+QQJ/4pNLFtmN7iO17i9/Y:Ny9iTEpNSQO17P
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1