General
-
Target
bf00f9185127b31eeca042e65ab5c22571afe26df48334a8cb024e43a4037b0b
-
Size
811KB
-
Sample
241110-zxbt3avkev
-
MD5
86d5b50872661e09028d7248eb7da529
-
SHA1
b74ff720a6beb5e2092fd3082bd990f29fcd3887
-
SHA256
bf00f9185127b31eeca042e65ab5c22571afe26df48334a8cb024e43a4037b0b
-
SHA512
7d091f718fe8bd132b1a391b932cd127bb362fc671b7f70160799c3aaeb56789ed0dbe2363956a429453584db81cab0e3400e4e94a120d7af6c72079b1434b87
-
SSDEEP
12288:SMr7y90lHUeWFhXzjJtYdVA9iRsyoSpnOMttzopibvGu7mNVUFqMa2A1KM:Vy9FhjttYdVCyrXbzopif7Ha2AEM
Static task
static1
Behavioral task
behavioral1
Sample
bf00f9185127b31eeca042e65ab5c22571afe26df48334a8cb024e43a4037b0b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
bf00f9185127b31eeca042e65ab5c22571afe26df48334a8cb024e43a4037b0b
-
Size
811KB
-
MD5
86d5b50872661e09028d7248eb7da529
-
SHA1
b74ff720a6beb5e2092fd3082bd990f29fcd3887
-
SHA256
bf00f9185127b31eeca042e65ab5c22571afe26df48334a8cb024e43a4037b0b
-
SHA512
7d091f718fe8bd132b1a391b932cd127bb362fc671b7f70160799c3aaeb56789ed0dbe2363956a429453584db81cab0e3400e4e94a120d7af6c72079b1434b87
-
SSDEEP
12288:SMr7y90lHUeWFhXzjJtYdVA9iRsyoSpnOMttzopibvGu7mNVUFqMa2A1KM:Vy9FhjttYdVCyrXbzopif7Ha2AEM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1