General
-
Target
75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3
-
Size
864KB
-
Sample
241104-rhv1dstlgq
-
MD5
a9e3700653facb2968df2d8d97787dff
-
SHA1
23592cc2e4fec13dff8b163a550f1c27a8d22a79
-
SHA256
75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3
-
SHA512
0c14f3a8cde71df192bb76f5512dde766563d64f3ecd3343422fdf7c2b776b4af1a2389aa53da9abdcaec4305c9bd5994903346ac92f104c7af658bb5ba8ad25
-
SSDEEP
24576:iyyAiwvxCM6urBSXpUcOwXNeeU57c6GYfP:JYwvxCMDrBjwXNnp6H
Static task
static1
Behavioral task
behavioral1
Sample
75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3
-
Size
864KB
-
MD5
a9e3700653facb2968df2d8d97787dff
-
SHA1
23592cc2e4fec13dff8b163a550f1c27a8d22a79
-
SHA256
75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3
-
SHA512
0c14f3a8cde71df192bb76f5512dde766563d64f3ecd3343422fdf7c2b776b4af1a2389aa53da9abdcaec4305c9bd5994903346ac92f104c7af658bb5ba8ad25
-
SSDEEP
24576:iyyAiwvxCM6urBSXpUcOwXNeeU57c6GYfP:JYwvxCMDrBjwXNnp6H
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1