General
-
Target
156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f
-
Size
1.4MB
-
Sample
241111-cx7v6szhqq
-
MD5
53aa81febf2a02eacec433f578f405c5
-
SHA1
06293f2171bc4b11cdabdfc4589c7b0229683ef9
-
SHA256
156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f
-
SHA512
a355f6c20f0fa48de61795da00e59bef6dbbf3dfd481b596e59959e82d96f5905209e2da8fcec30f14dd14a91e17537d165581cf465456313f6b1183bb18cee0
-
SSDEEP
24576:ey4+wf0Lk/wz8MYL89D511xQy0REXbMNgFlTNcutRMbkNSllXfSOi:tBsHw8MF570EMNgPNcARMb3LaO
Static task
static1
Behavioral task
behavioral1
Sample
156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f
-
Size
1.4MB
-
MD5
53aa81febf2a02eacec433f578f405c5
-
SHA1
06293f2171bc4b11cdabdfc4589c7b0229683ef9
-
SHA256
156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f
-
SHA512
a355f6c20f0fa48de61795da00e59bef6dbbf3dfd481b596e59959e82d96f5905209e2da8fcec30f14dd14a91e17537d165581cf465456313f6b1183bb18cee0
-
SSDEEP
24576:ey4+wf0Lk/wz8MYL89D511xQy0REXbMNgFlTNcutRMbkNSllXfSOi:tBsHw8MF570EMNgPNcARMb3LaO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1