General
-
Target
18b62d58c5a24c2c761221305883bdf67562890e3023294c5e2baf913173eaca
-
Size
385KB
-
Sample
241110-3j5rrszrej
-
MD5
9ba15a6fab81ccb9029709b25f7c1e9d
-
SHA1
85406d50653e7d567e0d590fa44237f007e93e5c
-
SHA256
18b62d58c5a24c2c761221305883bdf67562890e3023294c5e2baf913173eaca
-
SHA512
d3283c037d91330f2e48c4d9647abf7a784211efb8ff9505eee5230a52735e8a4c03021bd411516b4438ec23d50f2508d1c2103f5a6adef57a5354444d1d1e8e
-
SSDEEP
6144:K3y+bnr+Vp0yN90QE/PtBbHBZaaj/cwQc4VsbzTEIowF1ikpi1X0LANC:pMrBy90ttBLBt/cwlsWzTEItpi1X0v
Static task
static1
Behavioral task
behavioral1
Sample
18b62d58c5a24c2c761221305883bdf67562890e3023294c5e2baf913173eaca.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
18b62d58c5a24c2c761221305883bdf67562890e3023294c5e2baf913173eaca
-
Size
385KB
-
MD5
9ba15a6fab81ccb9029709b25f7c1e9d
-
SHA1
85406d50653e7d567e0d590fa44237f007e93e5c
-
SHA256
18b62d58c5a24c2c761221305883bdf67562890e3023294c5e2baf913173eaca
-
SHA512
d3283c037d91330f2e48c4d9647abf7a784211efb8ff9505eee5230a52735e8a4c03021bd411516b4438ec23d50f2508d1c2103f5a6adef57a5354444d1d1e8e
-
SSDEEP
6144:K3y+bnr+Vp0yN90QE/PtBbHBZaaj/cwQc4VsbzTEIowF1ikpi1X0LANC:pMrBy90ttBLBt/cwlsWzTEItpi1X0v
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1