General
-
Target
38115edfed66f83eb3fb1804cf1e3a4ff7b82620c324c65545639e19c2a87b26
-
Size
536KB
-
Sample
241111-am4pna1pcn
-
MD5
47ec5582b57d36e0800298f0f778d7ed
-
SHA1
7f3e4bd6056bb421d77c9df2174103cd639aa279
-
SHA256
38115edfed66f83eb3fb1804cf1e3a4ff7b82620c324c65545639e19c2a87b26
-
SHA512
a3e97c33715ae47bd055d4441390eaf21ce5962aabf6e18c928bbe47d8395572abb9afdad4123d87396878da5b4acf9a555422edc918fd6247744283230190bb
-
SSDEEP
12288:yMrCy90BR9lxRSSD293SUMk+2V9hfTaGhKE/:EyW9lxRSSDTkdf7KE/
Static task
static1
Behavioral task
behavioral1
Sample
38115edfed66f83eb3fb1804cf1e3a4ff7b82620c324c65545639e19c2a87b26.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
38115edfed66f83eb3fb1804cf1e3a4ff7b82620c324c65545639e19c2a87b26
-
Size
536KB
-
MD5
47ec5582b57d36e0800298f0f778d7ed
-
SHA1
7f3e4bd6056bb421d77c9df2174103cd639aa279
-
SHA256
38115edfed66f83eb3fb1804cf1e3a4ff7b82620c324c65545639e19c2a87b26
-
SHA512
a3e97c33715ae47bd055d4441390eaf21ce5962aabf6e18c928bbe47d8395572abb9afdad4123d87396878da5b4acf9a555422edc918fd6247744283230190bb
-
SSDEEP
12288:yMrCy90BR9lxRSSD293SUMk+2V9hfTaGhKE/:EyW9lxRSSDTkdf7KE/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1