General
-
Target
d8f441b9e46849b790153d14a4e99f17e6868ee69e16fa6400856103cbb5cd6b
-
Size
539KB
-
Sample
241109-zvyk2s1nfy
-
MD5
64cd423c85a55c2b5b5211b3472fe828
-
SHA1
802a457d78151065040421ca27bd6f8c21859569
-
SHA256
d8f441b9e46849b790153d14a4e99f17e6868ee69e16fa6400856103cbb5cd6b
-
SHA512
1040e4dbffd7f7c87be7222720fa2bc8bfe64d4e05e8b25cf87b568897f4741d151cc0d05fdea927fe8c1e4ec6b11ba8bfb7d8cc81156823577ca5a39ceaae24
-
SSDEEP
12288:SMrmy905rpDmCvxVWZYYgne9HBQe6u17TDGY:0yKICvxV9/e1V6u17TCY
Static task
static1
Behavioral task
behavioral1
Sample
d8f441b9e46849b790153d14a4e99f17e6868ee69e16fa6400856103cbb5cd6b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Targets
-
-
Target
d8f441b9e46849b790153d14a4e99f17e6868ee69e16fa6400856103cbb5cd6b
-
Size
539KB
-
MD5
64cd423c85a55c2b5b5211b3472fe828
-
SHA1
802a457d78151065040421ca27bd6f8c21859569
-
SHA256
d8f441b9e46849b790153d14a4e99f17e6868ee69e16fa6400856103cbb5cd6b
-
SHA512
1040e4dbffd7f7c87be7222720fa2bc8bfe64d4e05e8b25cf87b568897f4741d151cc0d05fdea927fe8c1e4ec6b11ba8bfb7d8cc81156823577ca5a39ceaae24
-
SSDEEP
12288:SMrmy905rpDmCvxVWZYYgne9HBQe6u17TDGY:0yKICvxV9/e1V6u17TCY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1