General
-
Target
cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe
-
Size
1.0MB
-
Sample
241119-bmzldayhmk
-
MD5
92dbab2af1099e1b23e30495f16d8673
-
SHA1
7b0b3d0ebbf9c563c0f67272145034be6c7018d5
-
SHA256
cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9
-
SHA512
f37793f8707cec27d4d035df75df581081ea7e8c824850cbbf15debdf7250f3915e2a5a47c9961ceafbd4a03646f7253804e23dec4ef0bbd1759e690eeeaf5c0
-
SSDEEP
24576:Uy+MgtZT8C2RC/IyxiHlvNvkhN2MgixQMiqAo9AL7:jN+ARCXiUMSxWrNP
Static task
static1
Behavioral task
behavioral1
Sample
cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe
-
Size
1.0MB
-
MD5
92dbab2af1099e1b23e30495f16d8673
-
SHA1
7b0b3d0ebbf9c563c0f67272145034be6c7018d5
-
SHA256
cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9
-
SHA512
f37793f8707cec27d4d035df75df581081ea7e8c824850cbbf15debdf7250f3915e2a5a47c9961ceafbd4a03646f7253804e23dec4ef0bbd1759e690eeeaf5c0
-
SSDEEP
24576:Uy+MgtZT8C2RC/IyxiHlvNvkhN2MgixQMiqAo9AL7:jN+ARCXiUMSxWrNP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1