General
-
Target
e2792e3a4383e0058df427419068b4104f6d4a2867dadea4828aeaf04db01ed9.exe
-
Size
518KB
-
Sample
241119-ybmh1a1hpk
-
MD5
b6f839e1c634dd6dba45930d82512bde
-
SHA1
2dc7789326ab1c74176bf656687f7a24dfa8dc44
-
SHA256
e2792e3a4383e0058df427419068b4104f6d4a2867dadea4828aeaf04db01ed9
-
SHA512
98798921efa56862d2ade506201cd76e351f939881d692f36aeb1236fd61ac78c387dc4702ff8928678361f239c2831718e274abe17bfcb28c07d34c62f2831d
-
SSDEEP
12288:xMrRy90wys716M8w9ceIW1hof5Kea/Wm7KR3U6np:QyUC16dwWeIW1WAGmE3U6np
Static task
static1
Behavioral task
behavioral1
Sample
e2792e3a4383e0058df427419068b4104f6d4a2867dadea4828aeaf04db01ed9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
e2792e3a4383e0058df427419068b4104f6d4a2867dadea4828aeaf04db01ed9.exe
-
Size
518KB
-
MD5
b6f839e1c634dd6dba45930d82512bde
-
SHA1
2dc7789326ab1c74176bf656687f7a24dfa8dc44
-
SHA256
e2792e3a4383e0058df427419068b4104f6d4a2867dadea4828aeaf04db01ed9
-
SHA512
98798921efa56862d2ade506201cd76e351f939881d692f36aeb1236fd61ac78c387dc4702ff8928678361f239c2831718e274abe17bfcb28c07d34c62f2831d
-
SSDEEP
12288:xMrRy90wys716M8w9ceIW1hof5Kea/Wm7KR3U6np:QyUC16dwWeIW1WAGmE3U6np
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1