General
-
Target
a606d445079a976908dd6e17fe4b3e41603b02efaeda36b4746e57e316277717.exe
-
Size
1009KB
-
Sample
241119-c34qpsyfph
-
MD5
8489674101c7ca0825f778ed817d77b7
-
SHA1
17ac69199544d4f16393a7c84d0e73dcfd6b97dd
-
SHA256
a606d445079a976908dd6e17fe4b3e41603b02efaeda36b4746e57e316277717
-
SHA512
27548d4983efe8087f0f37d89c4984c99dab2dfc405cc7112c79f1ef3a182fece60dd52881c282a0efc8db55cf2bb1e1b9693436f5346263efe50f14a2f4e03b
-
SSDEEP
24576:0y/aBsiDIpWlK9NC4GV4CJD5rtg1qp/IKDa9WrrjisvnJGHlKPWw:DSBscq6K9NC4e4ot8qdIuDNYFKP/
Static task
static1
Behavioral task
behavioral1
Sample
a606d445079a976908dd6e17fe4b3e41603b02efaeda36b4746e57e316277717.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
a606d445079a976908dd6e17fe4b3e41603b02efaeda36b4746e57e316277717.exe
-
Size
1009KB
-
MD5
8489674101c7ca0825f778ed817d77b7
-
SHA1
17ac69199544d4f16393a7c84d0e73dcfd6b97dd
-
SHA256
a606d445079a976908dd6e17fe4b3e41603b02efaeda36b4746e57e316277717
-
SHA512
27548d4983efe8087f0f37d89c4984c99dab2dfc405cc7112c79f1ef3a182fece60dd52881c282a0efc8db55cf2bb1e1b9693436f5346263efe50f14a2f4e03b
-
SSDEEP
24576:0y/aBsiDIpWlK9NC4GV4CJD5rtg1qp/IKDa9WrrjisvnJGHlKPWw:DSBscq6K9NC4e4ot8qdIuDNYFKP/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1