General
-
Target
cb7f3e96914398fe17e71c00abfccc878f24a91518cdb8d24f224e3ae30762ea
-
Size
557KB
-
Sample
241110-3tsvysxfmn
-
MD5
073f39f999c5e65a350765559538961a
-
SHA1
c1bf12d2a259ac0912ecc4f3a2bc811ed2e2c046
-
SHA256
cb7f3e96914398fe17e71c00abfccc878f24a91518cdb8d24f224e3ae30762ea
-
SHA512
7a993724544ad2ce7d3d231142f0c68b8c118eae90dc02cd7d47aa80f60e52beb4a155241a699995e272d387f1f4c5a1aac098e7981163290a2493d74bda787e
-
SSDEEP
12288:HMrKy90QhSpuRSnlGg6Z3+cz/iadt0ZUs+/X5ngLV4Wm:By5EgYwg6UcG6skNgLV4z
Static task
static1
Behavioral task
behavioral1
Sample
cb7f3e96914398fe17e71c00abfccc878f24a91518cdb8d24f224e3ae30762ea.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Targets
-
-
Target
cb7f3e96914398fe17e71c00abfccc878f24a91518cdb8d24f224e3ae30762ea
-
Size
557KB
-
MD5
073f39f999c5e65a350765559538961a
-
SHA1
c1bf12d2a259ac0912ecc4f3a2bc811ed2e2c046
-
SHA256
cb7f3e96914398fe17e71c00abfccc878f24a91518cdb8d24f224e3ae30762ea
-
SHA512
7a993724544ad2ce7d3d231142f0c68b8c118eae90dc02cd7d47aa80f60e52beb4a155241a699995e272d387f1f4c5a1aac098e7981163290a2493d74bda787e
-
SSDEEP
12288:HMrKy90QhSpuRSnlGg6Z3+cz/iadt0ZUs+/X5ngLV4Wm:By5EgYwg6UcG6skNgLV4z
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1