General
-
Target
0591105791c35a86e9bc01441928b8eb28a5250e4fd09e746243c38b8c362f68.exe
-
Size
399KB
-
Sample
250127-edyt9syqhv
-
MD5
c73a3cc02b410c7b029b653095fc342a
-
SHA1
f17b5386a7690372b23e3a35270c27e07a9eec01
-
SHA256
0591105791c35a86e9bc01441928b8eb28a5250e4fd09e746243c38b8c362f68
-
SHA512
1cfcc78a85f7dfb4474b148f63f52631c4aff3a48efe3830b7a8465aef991bee8f8f9db550fb5b635766b2a500622af814d84a0047b9e23cb57e1d8a7489002b
-
SSDEEP
12288:3Mrvy90GhN/R+qdDIB4HfllGAiS2kgABwjQ:syZ9vHlGAEPUGQ
Static task
static1
Behavioral task
behavioral1
Sample
0591105791c35a86e9bc01441928b8eb28a5250e4fd09e746243c38b8c362f68.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
0591105791c35a86e9bc01441928b8eb28a5250e4fd09e746243c38b8c362f68.exe
-
Size
399KB
-
MD5
c73a3cc02b410c7b029b653095fc342a
-
SHA1
f17b5386a7690372b23e3a35270c27e07a9eec01
-
SHA256
0591105791c35a86e9bc01441928b8eb28a5250e4fd09e746243c38b8c362f68
-
SHA512
1cfcc78a85f7dfb4474b148f63f52631c4aff3a48efe3830b7a8465aef991bee8f8f9db550fb5b635766b2a500622af814d84a0047b9e23cb57e1d8a7489002b
-
SSDEEP
12288:3Mrvy90GhN/R+qdDIB4HfllGAiS2kgABwjQ:syZ9vHlGAEPUGQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4