General
-
Target
03831d20fdf191cad660839546787fd3b26c259c75e5b84485d73f7302b267c2
-
Size
1.2MB
-
Sample
241111-cqhyga1bkb
-
MD5
0dbf2d1e6ae8b513339b69132951ef97
-
SHA1
e813d5e9dbb51d9c6fc57ba2d00773d6f2b56352
-
SHA256
03831d20fdf191cad660839546787fd3b26c259c75e5b84485d73f7302b267c2
-
SHA512
be9ef12e4877ff861f37360a3883a0a629a689ee25a9b429af6cf441e4761e51f05a752a7e28533f234eced8956d63cca91c8f20f5c8599cadd41ab27d5f7163
-
SSDEEP
24576:Wy3oRq9QjwLW2Ijk0fWJx/A2tg0O4DwPI49BV7R9C1A6qpFxA4om:l3TQWs5WJPtJDkV7RoA6qpFx
Static task
static1
Behavioral task
behavioral1
Sample
03831d20fdf191cad660839546787fd3b26c259c75e5b84485d73f7302b267c2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
03831d20fdf191cad660839546787fd3b26c259c75e5b84485d73f7302b267c2
-
Size
1.2MB
-
MD5
0dbf2d1e6ae8b513339b69132951ef97
-
SHA1
e813d5e9dbb51d9c6fc57ba2d00773d6f2b56352
-
SHA256
03831d20fdf191cad660839546787fd3b26c259c75e5b84485d73f7302b267c2
-
SHA512
be9ef12e4877ff861f37360a3883a0a629a689ee25a9b429af6cf441e4761e51f05a752a7e28533f234eced8956d63cca91c8f20f5c8599cadd41ab27d5f7163
-
SSDEEP
24576:Wy3oRq9QjwLW2Ijk0fWJx/A2tg0O4DwPI49BV7R9C1A6qpFxA4om:l3TQWs5WJPtJDkV7RoA6qpFx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1