General
-
Target
1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe
-
Size
1.2MB
-
Sample
241210-jfcf9stpej
-
MD5
7a4fec1d8431b18437caa70d74727df1
-
SHA1
7e61cbde9d11554b530704cab3286a3b4f677625
-
SHA256
1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f
-
SHA512
03d06c54b200303600a08c713245e089153a431ae762082cc8a6a8ec17305de789aef6da7728dcdc0cf07218a82bb0da56d73e62fddbb359be34fce7bfac33c3
-
SSDEEP
24576:1y8CI6ejP2HKUVxh4nhfaAuELGGsLm1PytSq+XSWNBL6SQRwU9/pj3L+fZVXunxj:QG6u2HKUfh4nhf0ELBsLm1P+v0SWNBLE
Static task
static1
Behavioral task
behavioral1
Sample
1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe
-
Size
1.2MB
-
MD5
7a4fec1d8431b18437caa70d74727df1
-
SHA1
7e61cbde9d11554b530704cab3286a3b4f677625
-
SHA256
1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f
-
SHA512
03d06c54b200303600a08c713245e089153a431ae762082cc8a6a8ec17305de789aef6da7728dcdc0cf07218a82bb0da56d73e62fddbb359be34fce7bfac33c3
-
SSDEEP
24576:1y8CI6ejP2HKUVxh4nhfaAuELGGsLm1PytSq+XSWNBL6SQRwU9/pj3L+fZVXunxj:QG6u2HKUfh4nhf0ELBsLm1P+v0SWNBLE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1