General
-
Target
930e8d2cf384fad22b3b2ce2ac20b07f668622ac0e369f1c4683b3fb968fe2c8
-
Size
577KB
-
Sample
241104-rfmk8stldl
-
MD5
762e08d3fc4951dd10ac2c0bdd62f566
-
SHA1
f0c5ab9105d16f9ed507750383217fa44cad1f72
-
SHA256
930e8d2cf384fad22b3b2ce2ac20b07f668622ac0e369f1c4683b3fb968fe2c8
-
SHA512
abdbf31a39793e74a0e7851a241e9f8dcde9502dffcc94ac82747bb3f2ce84733dfe9cd8b16ef6a057244d41c626513e5f0ff075494cc7c3c7ef2aa4f4675c1b
-
SSDEEP
12288:6MrOy90Aahimz7AuxqVtc0kyjYtPkxhGneUpuI1fAWd4a:cyZsVAuxYyustPkSeUMIxAc
Static task
static1
Behavioral task
behavioral1
Sample
930e8d2cf384fad22b3b2ce2ac20b07f668622ac0e369f1c4683b3fb968fe2c8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
930e8d2cf384fad22b3b2ce2ac20b07f668622ac0e369f1c4683b3fb968fe2c8
-
Size
577KB
-
MD5
762e08d3fc4951dd10ac2c0bdd62f566
-
SHA1
f0c5ab9105d16f9ed507750383217fa44cad1f72
-
SHA256
930e8d2cf384fad22b3b2ce2ac20b07f668622ac0e369f1c4683b3fb968fe2c8
-
SHA512
abdbf31a39793e74a0e7851a241e9f8dcde9502dffcc94ac82747bb3f2ce84733dfe9cd8b16ef6a057244d41c626513e5f0ff075494cc7c3c7ef2aa4f4675c1b
-
SSDEEP
12288:6MrOy90Aahimz7AuxqVtc0kyjYtPkxhGneUpuI1fAWd4a:cyZsVAuxYyustPkSeUMIxAc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1