General
-
Target
579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a
-
Size
1.2MB
-
Sample
241111-a4cx9sxrcw
-
MD5
79a7607d46aa5872d6a1e20eb144f38f
-
SHA1
b70e077738434da2297eb6dba34b63474268cdf7
-
SHA256
579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a
-
SHA512
d8cdc082b47b3ac2f80ce35f07fd7ae1c4aee072a3acbc8abdf54d4996b9352c813c4e9e259137d903db72221e547de5ed5f5350c5c1e65408bcceeaece40505
-
SSDEEP
24576:5yQ0omQKEf3VPM/6vvd7zfj7Ymv0PpXgwh4HM069NhQpEaEW:sQZd3FM/eZXcmvxjs0ONhBX
Static task
static1
Behavioral task
behavioral1
Sample
579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a
-
Size
1.2MB
-
MD5
79a7607d46aa5872d6a1e20eb144f38f
-
SHA1
b70e077738434da2297eb6dba34b63474268cdf7
-
SHA256
579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a
-
SHA512
d8cdc082b47b3ac2f80ce35f07fd7ae1c4aee072a3acbc8abdf54d4996b9352c813c4e9e259137d903db72221e547de5ed5f5350c5c1e65408bcceeaece40505
-
SSDEEP
24576:5yQ0omQKEf3VPM/6vvd7zfj7Ymv0PpXgwh4HM069NhQpEaEW:sQZd3FM/eZXcmvxjs0ONhBX
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1