General
-
Target
4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe
-
Size
667KB
-
Sample
241118-29b2psxcja
-
MD5
37e7b43f5423953c63c8279248731fb5
-
SHA1
3d08771f53e244826cb9ed662ea4250a494ce06a
-
SHA256
4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50
-
SHA512
92ebc1337fd26b4dfa604ac5e9023b852920143690364fdcbe2564fa3ba3760723a3e07748f18cbc1aa206208006e70d865461b8b6a1e4331ccacf76b2af0c0d
-
SSDEEP
12288:sMrVy90yEiQVa1cbxckb3KYlBljYooxYmnK+IcvMkwaMpe+Y6m6:RydEbVqcRHYvymKnmwpdm6
Static task
static1
Behavioral task
behavioral1
Sample
4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe
-
Size
667KB
-
MD5
37e7b43f5423953c63c8279248731fb5
-
SHA1
3d08771f53e244826cb9ed662ea4250a494ce06a
-
SHA256
4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50
-
SHA512
92ebc1337fd26b4dfa604ac5e9023b852920143690364fdcbe2564fa3ba3760723a3e07748f18cbc1aa206208006e70d865461b8b6a1e4331ccacf76b2af0c0d
-
SSDEEP
12288:sMrVy90yEiQVa1cbxckb3KYlBljYooxYmnK+IcvMkwaMpe+Y6m6:RydEbVqcRHYvymKnmwpdm6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1