General
-
Target
f9488f043e25c8bd21e1bec0c58d42e3b36f1207e00cb5104e14eec7a0db7e23
-
Size
544KB
-
Sample
241111-b1v54szarp
-
MD5
c01d2c69083281f035af1109142c3850
-
SHA1
558db6c2f93cb0cc13c5c7dd7e43d29aadcf5dde
-
SHA256
f9488f043e25c8bd21e1bec0c58d42e3b36f1207e00cb5104e14eec7a0db7e23
-
SHA512
a39336942613484af06f34e4d02b43f7f13ff9253ee0942b94ad46eae308ab7b405a49c2c1f5bcfb1e1ed2359c4efd4cc799ecfb2b33ce660289c28ab7b4e5c7
-
SSDEEP
12288:sMrAy90n6M1EsBVf96wkbQv/s0L6D6rKgcOQVSTLBdWZ8dicZ:cyvM1XBVF9koXBhce3jCqx
Static task
static1
Behavioral task
behavioral1
Sample
f9488f043e25c8bd21e1bec0c58d42e3b36f1207e00cb5104e14eec7a0db7e23.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
f9488f043e25c8bd21e1bec0c58d42e3b36f1207e00cb5104e14eec7a0db7e23
-
Size
544KB
-
MD5
c01d2c69083281f035af1109142c3850
-
SHA1
558db6c2f93cb0cc13c5c7dd7e43d29aadcf5dde
-
SHA256
f9488f043e25c8bd21e1bec0c58d42e3b36f1207e00cb5104e14eec7a0db7e23
-
SHA512
a39336942613484af06f34e4d02b43f7f13ff9253ee0942b94ad46eae308ab7b405a49c2c1f5bcfb1e1ed2359c4efd4cc799ecfb2b33ce660289c28ab7b4e5c7
-
SSDEEP
12288:sMrAy90n6M1EsBVf96wkbQv/s0L6D6rKgcOQVSTLBdWZ8dicZ:cyvM1XBVF9koXBhce3jCqx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1