General
-
Target
ea3da77db58feac7844f16d04dc1e3a15167856eb5bcc7fad64618919e2204a3.exe
-
Size
1.0MB
-
Sample
241118-174hha1phk
-
MD5
f6c4d9bcd369db29243fe4e0dad7172a
-
SHA1
c2b6a44ac5b7b6e34f4d45a64a02b5f8c0f05757
-
SHA256
ea3da77db58feac7844f16d04dc1e3a15167856eb5bcc7fad64618919e2204a3
-
SHA512
bae7e98e43bbf76108695be6e85665c01d78bcbb1088ab47617db9142ea83cf1c6364edc79cb40d6a9987e4be8f82468504fc8a01bbe0c1f678d0d4b5fab6c19
-
SSDEEP
24576:ayZ1XIWfI1bF/E21jDJ1fnaMpMzOv+FecyKheTAgwne7/4EsMl:hZC3j1vbPaM+e+LO2nI4EJ
Static task
static1
Behavioral task
behavioral1
Sample
ea3da77db58feac7844f16d04dc1e3a15167856eb5bcc7fad64618919e2204a3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Targets
-
-
Target
ea3da77db58feac7844f16d04dc1e3a15167856eb5bcc7fad64618919e2204a3.exe
-
Size
1.0MB
-
MD5
f6c4d9bcd369db29243fe4e0dad7172a
-
SHA1
c2b6a44ac5b7b6e34f4d45a64a02b5f8c0f05757
-
SHA256
ea3da77db58feac7844f16d04dc1e3a15167856eb5bcc7fad64618919e2204a3
-
SHA512
bae7e98e43bbf76108695be6e85665c01d78bcbb1088ab47617db9142ea83cf1c6364edc79cb40d6a9987e4be8f82468504fc8a01bbe0c1f678d0d4b5fab6c19
-
SSDEEP
24576:ayZ1XIWfI1bF/E21jDJ1fnaMpMzOv+FecyKheTAgwne7/4EsMl:hZC3j1vbPaM+e+LO2nI4EJ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1