General
-
Target
6429f862f96a78f162d827465f8bcbea5751d45f95c329084a29a72ef34ce1a2
-
Size
543KB
-
Sample
241110-z5ln8swbja
-
MD5
94216f4d2aa63c7e17f2aeb1f46ef3d4
-
SHA1
b408c37f58ffb5b1ccaa19116ecd1543bf1efb3f
-
SHA256
6429f862f96a78f162d827465f8bcbea5751d45f95c329084a29a72ef34ce1a2
-
SHA512
94f248c30126f80901d5b88512e8407edf9a94d2bedc5a9d79af93a8c3c605832f3e0fbe8d20ea5afe349ce2437e5796306bf9a45829d69f45b5782fa162d665
-
SSDEEP
12288:lMriy90ssVnjgBWBEnUsYYJDjQufGXfllGA883jLQmVQ:jy10n8AgjQ/lGAJ3HQ9
Static task
static1
Behavioral task
behavioral1
Sample
6429f862f96a78f162d827465f8bcbea5751d45f95c329084a29a72ef34ce1a2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
6429f862f96a78f162d827465f8bcbea5751d45f95c329084a29a72ef34ce1a2
-
Size
543KB
-
MD5
94216f4d2aa63c7e17f2aeb1f46ef3d4
-
SHA1
b408c37f58ffb5b1ccaa19116ecd1543bf1efb3f
-
SHA256
6429f862f96a78f162d827465f8bcbea5751d45f95c329084a29a72ef34ce1a2
-
SHA512
94f248c30126f80901d5b88512e8407edf9a94d2bedc5a9d79af93a8c3c605832f3e0fbe8d20ea5afe349ce2437e5796306bf9a45829d69f45b5782fa162d665
-
SSDEEP
12288:lMriy90ssVnjgBWBEnUsYYJDjQufGXfllGA883jLQmVQ:jy10n8AgjQ/lGAJ3HQ9
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1