General
-
Target
0232ae8524eadd7fc7f1951da929025b5851ab83f37337d8acf12af305baa09a
-
Size
393KB
-
Sample
241110-z5jvmsvlhx
-
MD5
11a1e9f36a073e82657ab7847fe529e1
-
SHA1
c12c5e6591288b60d9da395c581d0b7fe9e7cf5d
-
SHA256
0232ae8524eadd7fc7f1951da929025b5851ab83f37337d8acf12af305baa09a
-
SHA512
03cd5d6ef2f141d981a91841dde14c5e93c86dd0e8271d999620422584e78b2c2ef287718d8e74c763600926328e3bab75d2c01ba74ddb47f58e224a3ed4797f
-
SSDEEP
6144:Kyy+bnr+pp0yN90QEV7N9Je8brlCnfrPkEYhvakTIQ68FM2IMrBHdL:yMrJy90/NFVczPkxhv/IQ68FHL
Static task
static1
Behavioral task
behavioral1
Sample
0232ae8524eadd7fc7f1951da929025b5851ab83f37337d8acf12af305baa09a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
0232ae8524eadd7fc7f1951da929025b5851ab83f37337d8acf12af305baa09a
-
Size
393KB
-
MD5
11a1e9f36a073e82657ab7847fe529e1
-
SHA1
c12c5e6591288b60d9da395c581d0b7fe9e7cf5d
-
SHA256
0232ae8524eadd7fc7f1951da929025b5851ab83f37337d8acf12af305baa09a
-
SHA512
03cd5d6ef2f141d981a91841dde14c5e93c86dd0e8271d999620422584e78b2c2ef287718d8e74c763600926328e3bab75d2c01ba74ddb47f58e224a3ed4797f
-
SSDEEP
6144:Kyy+bnr+pp0yN90QEV7N9Je8brlCnfrPkEYhvakTIQ68FM2IMrBHdL:yMrJy90/NFVczPkxhv/IQ68FHL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1