General
-
Target
42470db9f3e7a3ab625282e235519b7f80bb4cf59f1ec541edb258432b1527d0
-
Size
1.2MB
-
Sample
241110-18dngawfpr
-
MD5
cf5c4a1065b38a43021222c4e9e714dc
-
SHA1
dc7d686a616e426087e24d17ed7b0b4215a6f8c6
-
SHA256
42470db9f3e7a3ab625282e235519b7f80bb4cf59f1ec541edb258432b1527d0
-
SHA512
c576b122be3a1dbe7b5a70ecb86a96c4ba2dc5f63fb3a9df112ce848e71342ac88d3c2b00c777ce8f52eda2e1f5c91f3fff95e2f1755460190417ed00a7e469a
-
SSDEEP
24576:kygfUzIksqG+hV1zT/yx6NABN80uIp2KtbJoXqYq:z1IxSVtg6+BNnVbJoXt
Static task
static1
Behavioral task
behavioral1
Sample
42470db9f3e7a3ab625282e235519b7f80bb4cf59f1ec541edb258432b1527d0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
42470db9f3e7a3ab625282e235519b7f80bb4cf59f1ec541edb258432b1527d0
-
Size
1.2MB
-
MD5
cf5c4a1065b38a43021222c4e9e714dc
-
SHA1
dc7d686a616e426087e24d17ed7b0b4215a6f8c6
-
SHA256
42470db9f3e7a3ab625282e235519b7f80bb4cf59f1ec541edb258432b1527d0
-
SHA512
c576b122be3a1dbe7b5a70ecb86a96c4ba2dc5f63fb3a9df112ce848e71342ac88d3c2b00c777ce8f52eda2e1f5c91f3fff95e2f1755460190417ed00a7e469a
-
SSDEEP
24576:kygfUzIksqG+hV1zT/yx6NABN80uIp2KtbJoXqYq:z1IxSVtg6+BNnVbJoXt
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1