General
-
Target
67455653d4fb4908630d1dc81aa4f655055f06c67a3f270d0d7549eaee54df78
-
Size
557KB
-
Sample
241111-axv59sycmj
-
MD5
33fbefbe2822e56b4d2a7d7d8c3727ea
-
SHA1
aff9636480b7a8a2e773ba2543b1bc4c3d6ded81
-
SHA256
67455653d4fb4908630d1dc81aa4f655055f06c67a3f270d0d7549eaee54df78
-
SHA512
5d824ce62a000447d38a672af7312eaa1e286c3d4b57e8e2046f7705c21f48d689170eed5a4986ed4fc2cfaf0388d15a9bfe4326781887802d509fa161d75c6b
-
SSDEEP
12288:LMriy90f+8rN7IddLMUxnHpl6pQK3g94CPZYZevAlW:5y8lREzLMUTQM9fKQvEW
Static task
static1
Behavioral task
behavioral1
Sample
67455653d4fb4908630d1dc81aa4f655055f06c67a3f270d0d7549eaee54df78.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Targets
-
-
Target
67455653d4fb4908630d1dc81aa4f655055f06c67a3f270d0d7549eaee54df78
-
Size
557KB
-
MD5
33fbefbe2822e56b4d2a7d7d8c3727ea
-
SHA1
aff9636480b7a8a2e773ba2543b1bc4c3d6ded81
-
SHA256
67455653d4fb4908630d1dc81aa4f655055f06c67a3f270d0d7549eaee54df78
-
SHA512
5d824ce62a000447d38a672af7312eaa1e286c3d4b57e8e2046f7705c21f48d689170eed5a4986ed4fc2cfaf0388d15a9bfe4326781887802d509fa161d75c6b
-
SSDEEP
12288:LMriy90f+8rN7IddLMUxnHpl6pQK3g94CPZYZevAlW:5y8lREzLMUTQM9fKQvEW
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1