General
-
Target
f8bd22d7167b55e118b4c24bf5bc25d6b5714e666de7613b2dd1076fe42a680a
-
Size
576KB
-
Sample
241110-1rcd3syqdl
-
MD5
c78c977f632d0e2d3daa967ccc98edb0
-
SHA1
af545d6a7c5ce26079619164778c9f685f32c4b1
-
SHA256
f8bd22d7167b55e118b4c24bf5bc25d6b5714e666de7613b2dd1076fe42a680a
-
SHA512
3f9147845d9924a71d70921ee64ebf312e7776eb24c3770d1ee853046650a62a4a62ac5ec8ffe3d294f0f7182ea3d53ff980b4f8eded1652ba4b5f807cecffd5
-
SSDEEP
12288:/MrMy90yahimz7AuxqVkTqNzTMly6mjfFCBy9D5N:3yfsVAuxYkTq5ufMfIg9N
Static task
static1
Behavioral task
behavioral1
Sample
f8bd22d7167b55e118b4c24bf5bc25d6b5714e666de7613b2dd1076fe42a680a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
f8bd22d7167b55e118b4c24bf5bc25d6b5714e666de7613b2dd1076fe42a680a
-
Size
576KB
-
MD5
c78c977f632d0e2d3daa967ccc98edb0
-
SHA1
af545d6a7c5ce26079619164778c9f685f32c4b1
-
SHA256
f8bd22d7167b55e118b4c24bf5bc25d6b5714e666de7613b2dd1076fe42a680a
-
SHA512
3f9147845d9924a71d70921ee64ebf312e7776eb24c3770d1ee853046650a62a4a62ac5ec8ffe3d294f0f7182ea3d53ff980b4f8eded1652ba4b5f807cecffd5
-
SSDEEP
12288:/MrMy90yahimz7AuxqVkTqNzTMly6mjfFCBy9D5N:3yfsVAuxYkTq5ufMfIg9N
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1