General
-
Target
bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe
-
Size
654KB
-
Sample
250208-fdpr2axmdq
-
MD5
3a5bc97dd959b0ef81d72aa5bbdb1414
-
SHA1
9f136ecf1d42ce506a85bcd35873f2293aa5303d
-
SHA256
bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63
-
SHA512
9fd22f67a75f60abadcdf735bf433ac2ff8567dd52c4ee47b7f274e711611305040e07a3b3b9afd9662bba02cf9223b19c6df7ef128c80150cc7a32bda4d7e42
-
SSDEEP
12288:yMrqy90psFcr/YiJwCapNeoujjgW7rGUTJNpNa+hdh:UyfFcrwiJW/uHdfGshdh
Static task
static1
Behavioral task
behavioral1
Sample
bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Targets
-
-
Target
bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe
-
Size
654KB
-
MD5
3a5bc97dd959b0ef81d72aa5bbdb1414
-
SHA1
9f136ecf1d42ce506a85bcd35873f2293aa5303d
-
SHA256
bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63
-
SHA512
9fd22f67a75f60abadcdf735bf433ac2ff8567dd52c4ee47b7f274e711611305040e07a3b3b9afd9662bba02cf9223b19c6df7ef128c80150cc7a32bda4d7e42
-
SSDEEP
12288:yMrqy90psFcr/YiJwCapNeoujjgW7rGUTJNpNa+hdh:UyfFcrwiJW/uHdfGshdh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4