General
-
Target
a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b
-
Size
544KB
-
Sample
241111-cphlbazfqk
-
MD5
81fe7a52ae7d7aa2653ded37b9011bfd
-
SHA1
3d21925f8fc5dedc7c790ac3d14bb4dbf144d882
-
SHA256
a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b
-
SHA512
d8d26f33ee5efb1dcc550ecf0810fd382f7517d2c62e411fa394e5376165a2a41d57ad6bfd8a61547fa436f8faac45e676c4a8050b7fed1741b5da1ea11447e7
-
SSDEEP
12288:pMrJy90gcHjdOY7GfQs3K/JYlflluArIJ65+by+QzgxKLBw:MyOjdQfQEK/6luAW652y+QzZLBw
Static task
static1
Behavioral task
behavioral1
Sample
a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b
-
Size
544KB
-
MD5
81fe7a52ae7d7aa2653ded37b9011bfd
-
SHA1
3d21925f8fc5dedc7c790ac3d14bb4dbf144d882
-
SHA256
a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b
-
SHA512
d8d26f33ee5efb1dcc550ecf0810fd382f7517d2c62e411fa394e5376165a2a41d57ad6bfd8a61547fa436f8faac45e676c4a8050b7fed1741b5da1ea11447e7
-
SSDEEP
12288:pMrJy90gcHjdOY7GfQs3K/JYlflluArIJ65+by+QzgxKLBw:MyOjdQfQEK/6luAW652y+QzZLBw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1