General
-
Target
c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b
-
Size
1.1MB
-
Sample
241104-rqjx4a1gjn
-
MD5
de71c5f1a6451e3b8b1e8f321ddc98e3
-
SHA1
f2684f1e4c9b53b28196952979179d37f2a756b0
-
SHA256
c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b
-
SHA512
dc2c8c4680d6d4a15d81a8bde2f40ab7061bc8ccb0d8cd3defa9a8ba20647f7a937add942761db38cf2298e53beec39a6384a70c19f0f5d7c324bd66a539f4be
-
SSDEEP
24576:MypTyccchID79eGqzt4YzpJmknf+HJ8CdQ:7ps+ID78G8zbmknf+H1d
Static task
static1
Behavioral task
behavioral1
Sample
c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b
-
Size
1.1MB
-
MD5
de71c5f1a6451e3b8b1e8f321ddc98e3
-
SHA1
f2684f1e4c9b53b28196952979179d37f2a756b0
-
SHA256
c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b
-
SHA512
dc2c8c4680d6d4a15d81a8bde2f40ab7061bc8ccb0d8cd3defa9a8ba20647f7a937add942761db38cf2298e53beec39a6384a70c19f0f5d7c324bd66a539f4be
-
SSDEEP
24576:MypTyccchID79eGqzt4YzpJmknf+HJ8CdQ:7ps+ID78G8zbmknf+H1d
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1