General
-
Target
3e7686daa403f400168691d9d1363fceb08c48c7ac001c9b263b757a1b36d722
-
Size
539KB
-
Sample
241110-nfgs7synek
-
MD5
bc09af667349a5519a9dd5a52ac887b3
-
SHA1
52b23a69826867d5b6565ae8d534de1c44961682
-
SHA256
3e7686daa403f400168691d9d1363fceb08c48c7ac001c9b263b757a1b36d722
-
SHA512
9c0313b5e1b7beb30134237eadedca75616eecdad95e809a7ec683faa717d11dec80df6c01e55120dabf1107d7c770ccad980edc488218f548fd5b476b823a68
-
SSDEEP
12288:QMrEy90ioq0f73QpGgBl+3Hcrhe9H98e6I17Bx0ep:EyYq0fzQtL+38Fe116I17D
Static task
static1
Behavioral task
behavioral1
Sample
3e7686daa403f400168691d9d1363fceb08c48c7ac001c9b263b757a1b36d722.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Targets
-
-
Target
3e7686daa403f400168691d9d1363fceb08c48c7ac001c9b263b757a1b36d722
-
Size
539KB
-
MD5
bc09af667349a5519a9dd5a52ac887b3
-
SHA1
52b23a69826867d5b6565ae8d534de1c44961682
-
SHA256
3e7686daa403f400168691d9d1363fceb08c48c7ac001c9b263b757a1b36d722
-
SHA512
9c0313b5e1b7beb30134237eadedca75616eecdad95e809a7ec683faa717d11dec80df6c01e55120dabf1107d7c770ccad980edc488218f548fd5b476b823a68
-
SSDEEP
12288:QMrEy90ioq0f73QpGgBl+3Hcrhe9H98e6I17Bx0ep:EyYq0fzQtL+38Fe116I17D
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1