General
-
Target
4adfbc2bd369352da2603a1660ecd65643131120729740677a814798322577c9
-
Size
811KB
-
Sample
241110-14pj6swerm
-
MD5
2e4df40e37ddf7eb3e40495a03bccdd0
-
SHA1
cc658eb8a1d785b2f8db381cee29aad082ad8f95
-
SHA256
4adfbc2bd369352da2603a1660ecd65643131120729740677a814798322577c9
-
SHA512
368b6b070da02e4c3de01b33411d2a59a79506b4ac7e3975122d4589103609737d84e2516de75ff9f0bcd0221ed6c2c79f19782c86c76cb76503fd947d556be2
-
SSDEEP
24576:GyB5Ytaf39EkGPlcoP7qSMgOlEBcm9Myl8L:VBqtaP9lG6q7qSMK3l
Static task
static1
Behavioral task
behavioral1
Sample
4adfbc2bd369352da2603a1660ecd65643131120729740677a814798322577c9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
4adfbc2bd369352da2603a1660ecd65643131120729740677a814798322577c9
-
Size
811KB
-
MD5
2e4df40e37ddf7eb3e40495a03bccdd0
-
SHA1
cc658eb8a1d785b2f8db381cee29aad082ad8f95
-
SHA256
4adfbc2bd369352da2603a1660ecd65643131120729740677a814798322577c9
-
SHA512
368b6b070da02e4c3de01b33411d2a59a79506b4ac7e3975122d4589103609737d84e2516de75ff9f0bcd0221ed6c2c79f19782c86c76cb76503fd947d556be2
-
SSDEEP
24576:GyB5Ytaf39EkGPlcoP7qSMgOlEBcm9Myl8L:VBqtaP9lG6q7qSMK3l
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1