General
-
Target
04080f8ba043a33df8baa21d785ef4438a0073778a091cb2e40ed9cc5cdb1787.exe
-
Size
1.4MB
-
Sample
250215-zm99watncq
-
MD5
0b3c3fb4e33d21f19a41981ca0fec79b
-
SHA1
3fdfbda9efc7b3204e45ffd2270a3215141c8de2
-
SHA256
04080f8ba043a33df8baa21d785ef4438a0073778a091cb2e40ed9cc5cdb1787
-
SHA512
7e6f30315d47aef46318ee0dde93242276397e2c6b64f9804f7d7b0823218325657314cc71cb132a78e540b7c68be00c11ce03bb46079fede3e549db8b934378
-
SSDEEP
24576:VyBX7l5h8dT4eaPka29XUvXWUtIilucgGsWv3X8P:whjeWfXFttucgjKHk
Static task
static1
Behavioral task
behavioral1
Sample
04080f8ba043a33df8baa21d785ef4438a0073778a091cb2e40ed9cc5cdb1787.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
04080f8ba043a33df8baa21d785ef4438a0073778a091cb2e40ed9cc5cdb1787.exe
-
Size
1.4MB
-
MD5
0b3c3fb4e33d21f19a41981ca0fec79b
-
SHA1
3fdfbda9efc7b3204e45ffd2270a3215141c8de2
-
SHA256
04080f8ba043a33df8baa21d785ef4438a0073778a091cb2e40ed9cc5cdb1787
-
SHA512
7e6f30315d47aef46318ee0dde93242276397e2c6b64f9804f7d7b0823218325657314cc71cb132a78e540b7c68be00c11ce03bb46079fede3e549db8b934378
-
SSDEEP
24576:VyBX7l5h8dT4eaPka29XUvXWUtIilucgGsWv3X8P:whjeWfXFttucgjKHk
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4