General
-
Target
ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135
-
Size
792KB
-
Sample
241110-3lbxgawrhw
-
MD5
6d06e7d8f8b563cfe30956717d781ae6
-
SHA1
596dadd6850c8b866ae684033e115be0bdda0234
-
SHA256
ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135
-
SHA512
fe77841c8daf0770940287210d724c1e8db5bd970ba92e7309324307eb74bea3b5d0446d9456bb3ac3823b2bad5c9d557561dde040a6c8edca4142192b6da579
-
SSDEEP
24576:cyf/EV0qK6/3BD9P2kH3grSj+IZmkqTvUGN2:LfsWq53RpZXg0mE
Static task
static1
Behavioral task
behavioral1
Sample
ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135
-
Size
792KB
-
MD5
6d06e7d8f8b563cfe30956717d781ae6
-
SHA1
596dadd6850c8b866ae684033e115be0bdda0234
-
SHA256
ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135
-
SHA512
fe77841c8daf0770940287210d724c1e8db5bd970ba92e7309324307eb74bea3b5d0446d9456bb3ac3823b2bad5c9d557561dde040a6c8edca4142192b6da579
-
SSDEEP
24576:cyf/EV0qK6/3BD9P2kH3grSj+IZmkqTvUGN2:LfsWq53RpZXg0mE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1