General
-
Target
c16b92bf182f200f3e1c1a1b4c49399383934cc82737bc8f0bfcc3f3afcc0b58
-
Size
1.2MB
-
Sample
250207-fe8arsyrey
-
MD5
85b02d852cfab7f15d6acaf1adbbf131
-
SHA1
87d0c2106fb25e185766ab00d792e0e3feeec300
-
SHA256
c16b92bf182f200f3e1c1a1b4c49399383934cc82737bc8f0bfcc3f3afcc0b58
-
SHA512
a133667bba6b1a89bd5047a1706d88eccc832eafc331c9111975bb88940d0b04f2689586850c557d73565e48a8d880a84bc33cad3fb7b6fd5c4f5773c124129b
-
SSDEEP
24576:Pyr2FP+ZXq03G1qsCEDKg7SnTdAOPJPJAxHlBufXkgk18lQKFU:ar2V+64GBrufT2OPjoFBuftk1gQ6
Static task
static1
Behavioral task
behavioral1
Sample
c16b92bf182f200f3e1c1a1b4c49399383934cc82737bc8f0bfcc3f3afcc0b58.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
c16b92bf182f200f3e1c1a1b4c49399383934cc82737bc8f0bfcc3f3afcc0b58
-
Size
1.2MB
-
MD5
85b02d852cfab7f15d6acaf1adbbf131
-
SHA1
87d0c2106fb25e185766ab00d792e0e3feeec300
-
SHA256
c16b92bf182f200f3e1c1a1b4c49399383934cc82737bc8f0bfcc3f3afcc0b58
-
SHA512
a133667bba6b1a89bd5047a1706d88eccc832eafc331c9111975bb88940d0b04f2689586850c557d73565e48a8d880a84bc33cad3fb7b6fd5c4f5773c124129b
-
SSDEEP
24576:Pyr2FP+ZXq03G1qsCEDKg7SnTdAOPJPJAxHlBufXkgk18lQKFU:ar2V+64GBrufT2OPjoFBuftk1gQ6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4