General
-
Target
cc544d9558345b63240b951f9ac101a8d9af1ff87312cbc301568e4bc9a63e8d
-
Size
544KB
-
Sample
241111-bjd59sygkk
-
MD5
d3e023021a222d7d21a64b3423cdf1e6
-
SHA1
67c18a25f080b938b9b99d85bbeec96f33879a23
-
SHA256
cc544d9558345b63240b951f9ac101a8d9af1ff87312cbc301568e4bc9a63e8d
-
SHA512
f8d39ca6841cdac9e87af34e76a9c507c53d022e2de40c7928b4c551d7f0497c42768641ba0feefe5ceeaaea3d1df35908260384f7665840c9bd8c9735dbadcd
-
SSDEEP
12288:AMroy90S3IraRDITs5tjL7KpwrdGlLL/Oie8067eMRnIV:YyRSYcgR7KpwEPV067Pu
Static task
static1
Behavioral task
behavioral1
Sample
cc544d9558345b63240b951f9ac101a8d9af1ff87312cbc301568e4bc9a63e8d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
cc544d9558345b63240b951f9ac101a8d9af1ff87312cbc301568e4bc9a63e8d
-
Size
544KB
-
MD5
d3e023021a222d7d21a64b3423cdf1e6
-
SHA1
67c18a25f080b938b9b99d85bbeec96f33879a23
-
SHA256
cc544d9558345b63240b951f9ac101a8d9af1ff87312cbc301568e4bc9a63e8d
-
SHA512
f8d39ca6841cdac9e87af34e76a9c507c53d022e2de40c7928b4c551d7f0497c42768641ba0feefe5ceeaaea3d1df35908260384f7665840c9bd8c9735dbadcd
-
SSDEEP
12288:AMroy90S3IraRDITs5tjL7KpwrdGlLL/Oie8067eMRnIV:YyRSYcgR7KpwEPV067Pu
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1