General
-
Target
199f39cf1819913d66734f1665c2f47a5eddb37a75dbf8eb77afd3632adcf8e7
-
Size
569KB
-
Sample
241104-qpm3pa1bjq
-
MD5
913f4ca5a01cb3fd6021b85cfb13427b
-
SHA1
c20b9e6118b6c3175c7c4b2e9da5e0fca9b26bb8
-
SHA256
199f39cf1819913d66734f1665c2f47a5eddb37a75dbf8eb77afd3632adcf8e7
-
SHA512
e3318ba5fb93386f2c35b393907210124b46cf8fda19591730fcba9f5965618f8dcb569f806dd927a2e395a93dd7aa5537ab965275494b50223cbc43c7b6860f
-
SSDEEP
12288:LMrfy90Hahimz7AuxqVZyeLXCnFyjzXLx5A46A3JBG:UyysVAuxYnXaK/x5APgJBG
Static task
static1
Behavioral task
behavioral1
Sample
199f39cf1819913d66734f1665c2f47a5eddb37a75dbf8eb77afd3632adcf8e7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
199f39cf1819913d66734f1665c2f47a5eddb37a75dbf8eb77afd3632adcf8e7
-
Size
569KB
-
MD5
913f4ca5a01cb3fd6021b85cfb13427b
-
SHA1
c20b9e6118b6c3175c7c4b2e9da5e0fca9b26bb8
-
SHA256
199f39cf1819913d66734f1665c2f47a5eddb37a75dbf8eb77afd3632adcf8e7
-
SHA512
e3318ba5fb93386f2c35b393907210124b46cf8fda19591730fcba9f5965618f8dcb569f806dd927a2e395a93dd7aa5537ab965275494b50223cbc43c7b6860f
-
SSDEEP
12288:LMrfy90Hahimz7AuxqVZyeLXCnFyjzXLx5A46A3JBG:UyysVAuxYnXaK/x5APgJBG
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1