General
-
Target
b7ceb34bba631c55fc7188814711ea344799c43833aae8df15ad1b094d7909a7
-
Size
1.1MB
-
Sample
241110-1lvcpsypdl
-
MD5
fd2a2a02a8f51064bf75d6c3d5254a96
-
SHA1
d2a4f30034e3648959fbc6855fcceefec7c21ba8
-
SHA256
b7ceb34bba631c55fc7188814711ea344799c43833aae8df15ad1b094d7909a7
-
SHA512
55403bae85dedd0df76f9881ecde8910acd8884bbd098e0ef905644bc6e87cd990301474017a135ad5559add6bf14127645043db72b3d544260bc5a7836b17de
-
SSDEEP
24576:9y1zcm3LXmVIq1o9aujaFx/h+ALoTfiAYwkqTj:Y1z93LXwI9aujaHYfiAY0
Static task
static1
Behavioral task
behavioral1
Sample
b7ceb34bba631c55fc7188814711ea344799c43833aae8df15ad1b094d7909a7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
b7ceb34bba631c55fc7188814711ea344799c43833aae8df15ad1b094d7909a7
-
Size
1.1MB
-
MD5
fd2a2a02a8f51064bf75d6c3d5254a96
-
SHA1
d2a4f30034e3648959fbc6855fcceefec7c21ba8
-
SHA256
b7ceb34bba631c55fc7188814711ea344799c43833aae8df15ad1b094d7909a7
-
SHA512
55403bae85dedd0df76f9881ecde8910acd8884bbd098e0ef905644bc6e87cd990301474017a135ad5559add6bf14127645043db72b3d544260bc5a7836b17de
-
SSDEEP
24576:9y1zcm3LXmVIq1o9aujaFx/h+ALoTfiAYwkqTj:Y1z93LXwI9aujaHYfiAY0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1