General
-
Target
d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8
-
Size
1.1MB
-
Sample
241111-cd6h1azdpn
-
MD5
ae931ffc22f5d1af5e7483e22ce7e974
-
SHA1
91a74cd8efd82f000dd81a5aa10d89a189d3affb
-
SHA256
d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8
-
SHA512
f38b1644ebc7c592f6eca226b970712679714858620be808a2bd523c463238740265f56283121c39b407e5f029e22c2eba5ef755bfae3b115d50ff5972c7a20d
-
SSDEEP
24576:DyHXwrfmp0sT9jY9xteh220t1yIzRVmEUc:WH8Hs9YdY220+IzREE
Static task
static1
Behavioral task
behavioral1
Sample
d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8
-
Size
1.1MB
-
MD5
ae931ffc22f5d1af5e7483e22ce7e974
-
SHA1
91a74cd8efd82f000dd81a5aa10d89a189d3affb
-
SHA256
d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8
-
SHA512
f38b1644ebc7c592f6eca226b970712679714858620be808a2bd523c463238740265f56283121c39b407e5f029e22c2eba5ef755bfae3b115d50ff5972c7a20d
-
SSDEEP
24576:DyHXwrfmp0sT9jY9xteh220t1yIzRVmEUc:WH8Hs9YdY220+IzREE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1