General
-
Target
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be
-
Size
864KB
-
Sample
241029-phrxmawpbn
-
MD5
23d9c4e1f9a78b1a72a39748ef4a2019
-
SHA1
789c420acdc6e147128fee8521b79e351f8293a6
-
SHA256
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be
-
SHA512
519f1d4d6fed2c7d492713523ae6c378b9a6410a36873f225c920dc371ddae89a09774913adb1ee61699da24f957ad1621503148d177e5ba739b71f56b5f276d
-
SSDEEP
24576:7y0A+40IMBqTEtIg1iLTXpQNby65YO9S:u0f4071IhCNG
Static task
static1
Behavioral task
behavioral1
Sample
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be.exe
Resource
win11-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be
-
Size
864KB
-
MD5
23d9c4e1f9a78b1a72a39748ef4a2019
-
SHA1
789c420acdc6e147128fee8521b79e351f8293a6
-
SHA256
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be
-
SHA512
519f1d4d6fed2c7d492713523ae6c378b9a6410a36873f225c920dc371ddae89a09774913adb1ee61699da24f957ad1621503148d177e5ba739b71f56b5f276d
-
SSDEEP
24576:7y0A+40IMBqTEtIg1iLTXpQNby65YO9S:u0f4071IhCNG
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1