General
-
Target
fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e
-
Size
537KB
-
Sample
241104-qylafs1cmm
-
MD5
65ad989417f264c50831408584a8d039
-
SHA1
b0ef8efdaa5d3290b52c277c93daa9200d136f51
-
SHA256
fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e
-
SHA512
e547e09f0b95ea95fedeedf118e7c9dc70400a466ad7385f3976e422c04cb25914791100b2615532732e9d5286a2fc631c83bf740af8512ac50ab5867829eb1b
-
SSDEEP
12288:gMrcy90epcPD0yI3QiDv2zL1FiP7NC7VzOL/G14uMH2TDrVYuv2:Myl85muzL1FiDNCC/3uMH2T12
Static task
static1
Behavioral task
behavioral1
Sample
fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e
-
Size
537KB
-
MD5
65ad989417f264c50831408584a8d039
-
SHA1
b0ef8efdaa5d3290b52c277c93daa9200d136f51
-
SHA256
fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e
-
SHA512
e547e09f0b95ea95fedeedf118e7c9dc70400a466ad7385f3976e422c04cb25914791100b2615532732e9d5286a2fc631c83bf740af8512ac50ab5867829eb1b
-
SSDEEP
12288:gMrcy90epcPD0yI3QiDv2zL1FiP7NC7VzOL/G14uMH2TDrVYuv2:Myl85muzL1FiDNCC/3uMH2T12
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1