General
-
Target
563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b
-
Size
1.1MB
-
Sample
241111-b2srdaynhy
-
MD5
5d5cf5535b98336f45e26555b064230c
-
SHA1
a0571bb3d640c3f1703a30015d340dc74f1a7f66
-
SHA256
563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b
-
SHA512
10bc2839acdb7572e481753a847795fe2871788ea3760029d3b2c853b3a1f6186be27dd835d750de6924a32ef69e3ec24d6faeb740ffb33a1e0b16ffdf47ce3f
-
SSDEEP
24576:AyK17wd8xQ5XYOukcYbMQ4giz673oHkNRg2wiSc:HKBwdcZ6t4gs67X7gnT
Static task
static1
Behavioral task
behavioral1
Sample
563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b
-
Size
1.1MB
-
MD5
5d5cf5535b98336f45e26555b064230c
-
SHA1
a0571bb3d640c3f1703a30015d340dc74f1a7f66
-
SHA256
563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b
-
SHA512
10bc2839acdb7572e481753a847795fe2871788ea3760029d3b2c853b3a1f6186be27dd835d750de6924a32ef69e3ec24d6faeb740ffb33a1e0b16ffdf47ce3f
-
SSDEEP
24576:AyK17wd8xQ5XYOukcYbMQ4giz673oHkNRg2wiSc:HKBwdcZ6t4gs67X7gnT
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1