General
-
Target
9ab1293f3c178dda71edfa3e5e741f50bfba067f1af351de381f4c062f9de779
-
Size
809KB
-
Sample
241110-zw8seavemq
-
MD5
142e67645f87a758e7dd4a247437f35d
-
SHA1
df389cc5482b46cc0d5e6254256ccf999894d6e3
-
SHA256
9ab1293f3c178dda71edfa3e5e741f50bfba067f1af351de381f4c062f9de779
-
SHA512
95902c18e64a3b6ecf1cb8f7e767373797c268dd5c5f49d3f16032cba120071d5eeba28baa6a7632a5a345f2ebbeeb7140388422d230b9fbd728a7d5578e68a9
-
SSDEEP
24576:qyoMABMKAUKIvHDh3iV2iVlLycLw0fRNu7HM:xoJMKAMvjhO/LnfRNu7H
Static task
static1
Behavioral task
behavioral1
Sample
9ab1293f3c178dda71edfa3e5e741f50bfba067f1af351de381f4c062f9de779.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
9ab1293f3c178dda71edfa3e5e741f50bfba067f1af351de381f4c062f9de779
-
Size
809KB
-
MD5
142e67645f87a758e7dd4a247437f35d
-
SHA1
df389cc5482b46cc0d5e6254256ccf999894d6e3
-
SHA256
9ab1293f3c178dda71edfa3e5e741f50bfba067f1af351de381f4c062f9de779
-
SHA512
95902c18e64a3b6ecf1cb8f7e767373797c268dd5c5f49d3f16032cba120071d5eeba28baa6a7632a5a345f2ebbeeb7140388422d230b9fbd728a7d5578e68a9
-
SSDEEP
24576:qyoMABMKAUKIvHDh3iV2iVlLycLw0fRNu7HM:xoJMKAMvjhO/LnfRNu7H
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1