General
-
Target
ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c
-
Size
536KB
-
Sample
241111-bhg6jaslgq
-
MD5
7ed2030e9459b0782f70ca9c69a99fd7
-
SHA1
69c37bcbf5f6be3031a3b2364ddf7f546aaeb0b0
-
SHA256
ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c
-
SHA512
7d2ba4e27b5043735cbf9eacbd983fdb95fe445f641ba4b620f53da7637d6f690e0ad2834b4ff62a8bae09831df8a50903016834d6a54010d74d19004e213822
-
SSDEEP
12288:cMrSy90DKLkeHF0moupaPbFyhK884/9iCwSDJj/W60Cl:my3llXzspy48REuJj/Ws
Static task
static1
Behavioral task
behavioral1
Sample
ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c
-
Size
536KB
-
MD5
7ed2030e9459b0782f70ca9c69a99fd7
-
SHA1
69c37bcbf5f6be3031a3b2364ddf7f546aaeb0b0
-
SHA256
ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c
-
SHA512
7d2ba4e27b5043735cbf9eacbd983fdb95fe445f641ba4b620f53da7637d6f690e0ad2834b4ff62a8bae09831df8a50903016834d6a54010d74d19004e213822
-
SSDEEP
12288:cMrSy90DKLkeHF0moupaPbFyhK884/9iCwSDJj/W60Cl:my3llXzspy48REuJj/Ws
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1