General
-
Target
977ae4617e4c27dd32866aeff10eb1faf167a9cf4f2078c1d7f785d42f1d7fe0
-
Size
539KB
-
Sample
241111-ay3aza1ral
-
MD5
830ec5be8ea0a8de8ddc1d9166565614
-
SHA1
a8573469c41ae9d4ed19b2c78b7f75f34ad2b880
-
SHA256
977ae4617e4c27dd32866aeff10eb1faf167a9cf4f2078c1d7f785d42f1d7fe0
-
SHA512
70f9be90f8a2121928fe4cee2c51377b5cbae43fd6d05abd61f54cf92af15dac8d8ce0682b0891252be537ab5eb95c834979fe1a8f006a71dba2dff5320e0a45
-
SSDEEP
12288:KMrJy90bMLn5stlUNfvacTmXGTpw3gabGHE3d9:TyY2n5sLaiwQR9
Static task
static1
Behavioral task
behavioral1
Sample
977ae4617e4c27dd32866aeff10eb1faf167a9cf4f2078c1d7f785d42f1d7fe0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Targets
-
-
Target
977ae4617e4c27dd32866aeff10eb1faf167a9cf4f2078c1d7f785d42f1d7fe0
-
Size
539KB
-
MD5
830ec5be8ea0a8de8ddc1d9166565614
-
SHA1
a8573469c41ae9d4ed19b2c78b7f75f34ad2b880
-
SHA256
977ae4617e4c27dd32866aeff10eb1faf167a9cf4f2078c1d7f785d42f1d7fe0
-
SHA512
70f9be90f8a2121928fe4cee2c51377b5cbae43fd6d05abd61f54cf92af15dac8d8ce0682b0891252be537ab5eb95c834979fe1a8f006a71dba2dff5320e0a45
-
SSDEEP
12288:KMrJy90bMLn5stlUNfvacTmXGTpw3gabGHE3d9:TyY2n5sLaiwQR9
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1