General
-
Target
9e71aa8ef140f7622d3179c33db7fd34d61580a25c6c0309f0946f029dec879eN.exe
-
Size
383KB
-
Sample
241119-xfrg3svmgm
-
MD5
1906a5b46e2ee7bdcfedaef3f64cf550
-
SHA1
470f800a4e9f1fcb54d2743d1211bdc62467da93
-
SHA256
9e71aa8ef140f7622d3179c33db7fd34d61580a25c6c0309f0946f029dec879e
-
SHA512
9afc71119eba3f009d382740dfe30586b63266aba00cd65cfbe3e7a239e8b2af9c449aab353b2d5dd1eaa3c464c49991365745483fcedcb25cad761ddec2fb50
-
SSDEEP
6144:KGy+bnr+hp0yN90QEANGttH3Jy9joaRTH2VEsosBFUeyvwhgQAo2oR:mMrNy90ie3ARTCEJb1EgQA0R
Static task
static1
Behavioral task
behavioral1
Sample
9e71aa8ef140f7622d3179c33db7fd34d61580a25c6c0309f0946f029dec879eN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
9e71aa8ef140f7622d3179c33db7fd34d61580a25c6c0309f0946f029dec879eN.exe
-
Size
383KB
-
MD5
1906a5b46e2ee7bdcfedaef3f64cf550
-
SHA1
470f800a4e9f1fcb54d2743d1211bdc62467da93
-
SHA256
9e71aa8ef140f7622d3179c33db7fd34d61580a25c6c0309f0946f029dec879e
-
SHA512
9afc71119eba3f009d382740dfe30586b63266aba00cd65cfbe3e7a239e8b2af9c449aab353b2d5dd1eaa3c464c49991365745483fcedcb25cad761ddec2fb50
-
SSDEEP
6144:KGy+bnr+hp0yN90QEANGttH3Jy9joaRTH2VEsosBFUeyvwhgQAo2oR:mMrNy90ie3ARTCEJb1EgQA0R
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1