General
-
Target
d2ad9151664a554a3e1c58669ba5e6ceff58e1cbcf3a70897cf47e14ff818929
-
Size
1.2MB
-
Sample
241111-cxcd9stnfk
-
MD5
a6da5084429141a4eafc63b800990689
-
SHA1
c66eb697bae4cc9412d5b52cd387ebe2adc13bbd
-
SHA256
d2ad9151664a554a3e1c58669ba5e6ceff58e1cbcf3a70897cf47e14ff818929
-
SHA512
b6da8d2fed6bdccdfea5e13684dec2c4db94e9e77ab4858d2949d68c48db5026c303b4bd76aa4c555c74059fc3c0780062d19698fdfa38a13a2ef112127d1dff
-
SSDEEP
24576:1ytVHg8W4+bscZ/DxJaoc1MaCE6O+aEzYe+M6RbNo4jx7SuNk:QrHfasM/DxJX4MaCLO+aCL+MZMlTN
Static task
static1
Behavioral task
behavioral1
Sample
d2ad9151664a554a3e1c58669ba5e6ceff58e1cbcf3a70897cf47e14ff818929.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
d2ad9151664a554a3e1c58669ba5e6ceff58e1cbcf3a70897cf47e14ff818929
-
Size
1.2MB
-
MD5
a6da5084429141a4eafc63b800990689
-
SHA1
c66eb697bae4cc9412d5b52cd387ebe2adc13bbd
-
SHA256
d2ad9151664a554a3e1c58669ba5e6ceff58e1cbcf3a70897cf47e14ff818929
-
SHA512
b6da8d2fed6bdccdfea5e13684dec2c4db94e9e77ab4858d2949d68c48db5026c303b4bd76aa4c555c74059fc3c0780062d19698fdfa38a13a2ef112127d1dff
-
SSDEEP
24576:1ytVHg8W4+bscZ/DxJaoc1MaCE6O+aEzYe+M6RbNo4jx7SuNk:QrHfasM/DxJX4MaCLO+aCL+MZMlTN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1