General
-
Target
1394ca9465ca06a17bbacd5a5d2ffa6e0304eedbc42e8e4cd95aff118c2ea9a0
-
Size
1.4MB
-
Sample
250214-aqgdjaxnhn
-
MD5
3a8b22134a12428e33964421ed8979d2
-
SHA1
e30f402214c3f90fd8bebff012168cde9faa16d8
-
SHA256
1394ca9465ca06a17bbacd5a5d2ffa6e0304eedbc42e8e4cd95aff118c2ea9a0
-
SHA512
0185c062182c6bc9a592765084c700a10801786fe0ada8803f12c2bb095386fc07e04ba5e77067474fd3cd2a0f3470e7beae776d2d2a98fa3687ea6b2585aa6d
-
SSDEEP
24576:QyWHIfTCYMaH8FjDjHHxvlQnmfzuPmN6yiEWyhbdaiPi/Xqc:XlfTCYtH8Fvr7V6nyyy3mv
Static task
static1
Behavioral task
behavioral1
Sample
1394ca9465ca06a17bbacd5a5d2ffa6e0304eedbc42e8e4cd95aff118c2ea9a0.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
1394ca9465ca06a17bbacd5a5d2ffa6e0304eedbc42e8e4cd95aff118c2ea9a0
-
Size
1.4MB
-
MD5
3a8b22134a12428e33964421ed8979d2
-
SHA1
e30f402214c3f90fd8bebff012168cde9faa16d8
-
SHA256
1394ca9465ca06a17bbacd5a5d2ffa6e0304eedbc42e8e4cd95aff118c2ea9a0
-
SHA512
0185c062182c6bc9a592765084c700a10801786fe0ada8803f12c2bb095386fc07e04ba5e77067474fd3cd2a0f3470e7beae776d2d2a98fa3687ea6b2585aa6d
-
SSDEEP
24576:QyWHIfTCYMaH8FjDjHHxvlQnmfzuPmN6yiEWyhbdaiPi/Xqc:XlfTCYtH8Fvr7V6nyyy3mv
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4