General
-
Target
7ee7850ad2f65f78c230c42d92be2a99618046d09c96c275dbf8f89308d529ff
-
Size
536KB
-
Sample
241104-q23c5stjdl
-
MD5
7c77bf09ecf8d38318171dee70ee3e21
-
SHA1
e22766c10570d5656fcb5982699928f78ca4021e
-
SHA256
7ee7850ad2f65f78c230c42d92be2a99618046d09c96c275dbf8f89308d529ff
-
SHA512
dc6f9405b6d7c990e8e99d244758ad930073e16b4178c4d1e026c21447d72dfa81db4209d6b514043d4bd66761ac84fb4fc1752546d59c7f0559552410f10453
-
SSDEEP
12288:QMr4y90/a6dfmOwosiEnCcblJtx/uifq18n7y4PQz3:4yQa4faEEnfJv/u+q2PQz
Static task
static1
Behavioral task
behavioral1
Sample
7ee7850ad2f65f78c230c42d92be2a99618046d09c96c275dbf8f89308d529ff.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
7ee7850ad2f65f78c230c42d92be2a99618046d09c96c275dbf8f89308d529ff
-
Size
536KB
-
MD5
7c77bf09ecf8d38318171dee70ee3e21
-
SHA1
e22766c10570d5656fcb5982699928f78ca4021e
-
SHA256
7ee7850ad2f65f78c230c42d92be2a99618046d09c96c275dbf8f89308d529ff
-
SHA512
dc6f9405b6d7c990e8e99d244758ad930073e16b4178c4d1e026c21447d72dfa81db4209d6b514043d4bd66761ac84fb4fc1752546d59c7f0559552410f10453
-
SSDEEP
12288:QMr4y90/a6dfmOwosiEnCcblJtx/uifq18n7y4PQz3:4yQa4faEEnfJv/u+q2PQz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1