General
-
Target
e4593a19d5b9990b6a03dee05bed3ab1c175c98f5fc01203bc6cea3dbbc1ec2dN.exe
-
Size
556KB
-
Sample
241119-dgaq6syhjg
-
MD5
0019e805d3dd3922da6a33a71e37d5a0
-
SHA1
4b1a5f5f2b82354a6dc779b694f23b70589dfdd6
-
SHA256
e4593a19d5b9990b6a03dee05bed3ab1c175c98f5fc01203bc6cea3dbbc1ec2d
-
SHA512
f56771474742995d461079d2db867a7fa2676eb1315c42c39e3323cfc00097fe2f7cf2e6451a16d0790213ac5d562410d07bea90ad4dbf4d35a59a1de3e03da2
-
SSDEEP
12288:MMrSy90iNqUPdj2gI5vm1HnCL6pJGjxAxI9grmWD:+y1PdaN5uS+GjKI9Kr
Static task
static1
Behavioral task
behavioral1
Sample
e4593a19d5b9990b6a03dee05bed3ab1c175c98f5fc01203bc6cea3dbbc1ec2dN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
e4593a19d5b9990b6a03dee05bed3ab1c175c98f5fc01203bc6cea3dbbc1ec2dN.exe
-
Size
556KB
-
MD5
0019e805d3dd3922da6a33a71e37d5a0
-
SHA1
4b1a5f5f2b82354a6dc779b694f23b70589dfdd6
-
SHA256
e4593a19d5b9990b6a03dee05bed3ab1c175c98f5fc01203bc6cea3dbbc1ec2d
-
SHA512
f56771474742995d461079d2db867a7fa2676eb1315c42c39e3323cfc00097fe2f7cf2e6451a16d0790213ac5d562410d07bea90ad4dbf4d35a59a1de3e03da2
-
SSDEEP
12288:MMrSy90iNqUPdj2gI5vm1HnCL6pJGjxAxI9grmWD:+y1PdaN5uS+GjKI9Kr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1