General
-
Target
9a44e92d9f91f46c440147b6ac59e8c7cd4d60a7d3bb2adb441eabe4dbe2e348
-
Size
398KB
-
Sample
241111-bvmlsaymgx
-
MD5
b9699518cc3eb473f1e40fa602fdd5f5
-
SHA1
82f0aa154492521a3369cfbea9f433474e87ec80
-
SHA256
9a44e92d9f91f46c440147b6ac59e8c7cd4d60a7d3bb2adb441eabe4dbe2e348
-
SHA512
45c6fbb9a4e333583783ad01fa88415998ea1ab443f1e7e158b384981f71dc0e8f759ebdde7f72330652daf9a31faf3b3b6b0343cef483cdd0462216c07e31b1
-
SSDEEP
6144:Kny+bnr+Up0yN90QE6CnPSImOUx7PhMw7dPhnSWYn4MQ5B1mlYetZqRzgcby:BMrQy90QKPeLOw3SWsQRmttipy
Static task
static1
Behavioral task
behavioral1
Sample
9a44e92d9f91f46c440147b6ac59e8c7cd4d60a7d3bb2adb441eabe4dbe2e348.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
9a44e92d9f91f46c440147b6ac59e8c7cd4d60a7d3bb2adb441eabe4dbe2e348
-
Size
398KB
-
MD5
b9699518cc3eb473f1e40fa602fdd5f5
-
SHA1
82f0aa154492521a3369cfbea9f433474e87ec80
-
SHA256
9a44e92d9f91f46c440147b6ac59e8c7cd4d60a7d3bb2adb441eabe4dbe2e348
-
SHA512
45c6fbb9a4e333583783ad01fa88415998ea1ab443f1e7e158b384981f71dc0e8f759ebdde7f72330652daf9a31faf3b3b6b0343cef483cdd0462216c07e31b1
-
SSDEEP
6144:Kny+bnr+Up0yN90QE6CnPSImOUx7PhMw7dPhnSWYn4MQ5B1mlYetZqRzgcby:BMrQy90QKPeLOw3SWsQRmttipy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1