General
-
Target
737b93112272bc39c820abfc91dfde8d3b7769bffb3f0e6e2bb71c691a114afe
-
Size
533KB
-
Sample
241104-q6kzna1dmp
-
MD5
87d386db4e302f29a1b480819fdb03b7
-
SHA1
cba5d7bc18256a44099a4c1d369925a90e6a0718
-
SHA256
737b93112272bc39c820abfc91dfde8d3b7769bffb3f0e6e2bb71c691a114afe
-
SHA512
aaa681afb8affc93713afd2bb3b639bbd9c5d5965cf68853c6673fa4c01f6319824ec3a709fce711839c2e38acc8967be33f04e4fd500722c5bc906228e87b35
-
SSDEEP
12288:zMrky90W7S9ms+lfMbNn8uexscoj9N/7tkPHJK95:/yn7Bfwdeloj9NOpS
Static task
static1
Behavioral task
behavioral1
Sample
737b93112272bc39c820abfc91dfde8d3b7769bffb3f0e6e2bb71c691a114afe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
737b93112272bc39c820abfc91dfde8d3b7769bffb3f0e6e2bb71c691a114afe
-
Size
533KB
-
MD5
87d386db4e302f29a1b480819fdb03b7
-
SHA1
cba5d7bc18256a44099a4c1d369925a90e6a0718
-
SHA256
737b93112272bc39c820abfc91dfde8d3b7769bffb3f0e6e2bb71c691a114afe
-
SHA512
aaa681afb8affc93713afd2bb3b639bbd9c5d5965cf68853c6673fa4c01f6319824ec3a709fce711839c2e38acc8967be33f04e4fd500722c5bc906228e87b35
-
SSDEEP
12288:zMrky90W7S9ms+lfMbNn8uexscoj9N/7tkPHJK95:/yn7Bfwdeloj9NOpS
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1