General
-
Target
39702043f2c0d4141db3f079b03885ffc5cfd111be07002151033852605ee00e
-
Size
537KB
-
Sample
241110-zxmassvenq
-
MD5
3f6460a7c3f7b649cc1f6f208780491e
-
SHA1
755a6b37003223a40b5e6eff03c0d34567c340bc
-
SHA256
39702043f2c0d4141db3f079b03885ffc5cfd111be07002151033852605ee00e
-
SHA512
d50d02ddda1702221094f11c465d23faa5b4d6987e71b9481df40183d40d837438e4f4fdf236e4d3bbfb3f72539843a7d12d6e8eb7f97924d9eee9f659de98e5
-
SSDEEP
12288:gMrpy90kLgarwufahQB73D7VqOLi9LDnnYyqwePTy:Zypga0uUu3D5i9LbnCLy
Static task
static1
Behavioral task
behavioral1
Sample
39702043f2c0d4141db3f079b03885ffc5cfd111be07002151033852605ee00e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
39702043f2c0d4141db3f079b03885ffc5cfd111be07002151033852605ee00e
-
Size
537KB
-
MD5
3f6460a7c3f7b649cc1f6f208780491e
-
SHA1
755a6b37003223a40b5e6eff03c0d34567c340bc
-
SHA256
39702043f2c0d4141db3f079b03885ffc5cfd111be07002151033852605ee00e
-
SHA512
d50d02ddda1702221094f11c465d23faa5b4d6987e71b9481df40183d40d837438e4f4fdf236e4d3bbfb3f72539843a7d12d6e8eb7f97924d9eee9f659de98e5
-
SSDEEP
12288:gMrpy90kLgarwufahQB73D7VqOLi9LDnnYyqwePTy:Zypga0uUu3D5i9LbnCLy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1