General
-
Target
f00921ac9f15cc4064c8888fbd3c6fba659ee982a8691b039fbada136f38c7ca
-
Size
393KB
-
Sample
241110-cmkynaxclr
-
MD5
1a1f63442e6319c5f740941072716314
-
SHA1
d103a892872461e97b98ebc1fbc4a05e0dacf564
-
SHA256
f00921ac9f15cc4064c8888fbd3c6fba659ee982a8691b039fbada136f38c7ca
-
SHA512
28b9e817ece4000c1ce8d8fd1022b0c9c69d0308037b913d1080d50b21056d10fdd99211834d11a0c9a0691ed32b98f1549c8f4ea556ae59e3a18de77c9014d1
-
SSDEEP
6144:KYy+bnr+Jp0yN90QEW7N9Je8brlCnfrPkEYhvakTIQ68FM2IMrBHdG:sMrhy90gNFVczPkxhv/IQ68FHG
Static task
static1
Behavioral task
behavioral1
Sample
f00921ac9f15cc4064c8888fbd3c6fba659ee982a8691b039fbada136f38c7ca.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
f00921ac9f15cc4064c8888fbd3c6fba659ee982a8691b039fbada136f38c7ca
-
Size
393KB
-
MD5
1a1f63442e6319c5f740941072716314
-
SHA1
d103a892872461e97b98ebc1fbc4a05e0dacf564
-
SHA256
f00921ac9f15cc4064c8888fbd3c6fba659ee982a8691b039fbada136f38c7ca
-
SHA512
28b9e817ece4000c1ce8d8fd1022b0c9c69d0308037b913d1080d50b21056d10fdd99211834d11a0c9a0691ed32b98f1549c8f4ea556ae59e3a18de77c9014d1
-
SSDEEP
6144:KYy+bnr+Jp0yN90QEW7N9Je8brlCnfrPkEYhvakTIQ68FM2IMrBHdG:sMrhy90gNFVczPkxhv/IQ68FHG
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1