General
-
Target
dbd825c4309156396e70e35dcdbebc213791536a5650440e732a7d8e0f4fad33
-
Size
577KB
-
Sample
241110-3tk54sxket
-
MD5
c964468987fd35b19e23ada3cef2e803
-
SHA1
92e6e9778c3c4150d8f060b3f9d1a4bcf0a27530
-
SHA256
dbd825c4309156396e70e35dcdbebc213791536a5650440e732a7d8e0f4fad33
-
SHA512
fe4a9d92c59b481446281f8670409f2de2f9ec7b25b490fd42b377c7299fa0783f4965ca2ac41664fa750f78c7e5de2a2ce585aa0a7dc0b074f67f0fe71b8859
-
SSDEEP
12288:HMrXy90+ahimz7AuxqVOt/9ZgF6kjUSzeO65tUAy:gyHsVAuxYoggkwieO65WAy
Static task
static1
Behavioral task
behavioral1
Sample
dbd825c4309156396e70e35dcdbebc213791536a5650440e732a7d8e0f4fad33.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
dbd825c4309156396e70e35dcdbebc213791536a5650440e732a7d8e0f4fad33
-
Size
577KB
-
MD5
c964468987fd35b19e23ada3cef2e803
-
SHA1
92e6e9778c3c4150d8f060b3f9d1a4bcf0a27530
-
SHA256
dbd825c4309156396e70e35dcdbebc213791536a5650440e732a7d8e0f4fad33
-
SHA512
fe4a9d92c59b481446281f8670409f2de2f9ec7b25b490fd42b377c7299fa0783f4965ca2ac41664fa750f78c7e5de2a2ce585aa0a7dc0b074f67f0fe71b8859
-
SSDEEP
12288:HMrXy90+ahimz7AuxqVOt/9ZgF6kjUSzeO65tUAy:gyHsVAuxYoggkwieO65WAy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1