General
-
Target
64b3e99c88cecdff027b253b84c8b157e198efd38350519ff6bb0872f70e0f90
-
Size
543KB
-
Sample
241111-ber7bszaqa
-
MD5
24a7f114cacc79b831d3d849819ea98d
-
SHA1
3a2bd79c6f6426d8b5414f4f7e85c4acd35bfc5d
-
SHA256
64b3e99c88cecdff027b253b84c8b157e198efd38350519ff6bb0872f70e0f90
-
SHA512
458a9a387c1e995812fc1e220772aed2cb32280173c3a5073b449d6dda8d987c9431b55c15dc5eef6fae0be5a250cd72793537c93ed64ef249385d83977a1cfe
-
SSDEEP
12288:8MrEy90qAOzM7ecDGslNBP5sdPAfllOAAVaAqQgJQksj:IyXfY7bGojWClOAGXUu
Static task
static1
Behavioral task
behavioral1
Sample
64b3e99c88cecdff027b253b84c8b157e198efd38350519ff6bb0872f70e0f90.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
64b3e99c88cecdff027b253b84c8b157e198efd38350519ff6bb0872f70e0f90
-
Size
543KB
-
MD5
24a7f114cacc79b831d3d849819ea98d
-
SHA1
3a2bd79c6f6426d8b5414f4f7e85c4acd35bfc5d
-
SHA256
64b3e99c88cecdff027b253b84c8b157e198efd38350519ff6bb0872f70e0f90
-
SHA512
458a9a387c1e995812fc1e220772aed2cb32280173c3a5073b449d6dda8d987c9431b55c15dc5eef6fae0be5a250cd72793537c93ed64ef249385d83977a1cfe
-
SSDEEP
12288:8MrEy90qAOzM7ecDGslNBP5sdPAfllOAAVaAqQgJQksj:IyXfY7bGojWClOAGXUu
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1