General
-
Target
3ebb62abf546e079af1f528322f908f691d6ed701db1d0624557777b5ba33a26
-
Size
719KB
-
Sample
241111-1eyfsawmaw
-
MD5
9a096586fc4976e9f79312224dcc7f6d
-
SHA1
a062bdb14aad761d3fe2a13618fa1b5a256acb8b
-
SHA256
3ebb62abf546e079af1f528322f908f691d6ed701db1d0624557777b5ba33a26
-
SHA512
69fa210ed00e7e0c0606363e8e7e4aad1737fac0946e9f792a839a0eff2ce1f388d1a41ad9489172c7b9e83d566f8f917637986f3fd9fe3f605c83601adc355a
-
SSDEEP
12288:cMrny90M5Br4zigJTWGKlKS8Fc9U7MpQIglkeyXBgo9VBYB86sAW:DyPUzigBcElwQIZeyXB7zCyeW
Static task
static1
Behavioral task
behavioral1
Sample
3ebb62abf546e079af1f528322f908f691d6ed701db1d0624557777b5ba33a26.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
3ebb62abf546e079af1f528322f908f691d6ed701db1d0624557777b5ba33a26
-
Size
719KB
-
MD5
9a096586fc4976e9f79312224dcc7f6d
-
SHA1
a062bdb14aad761d3fe2a13618fa1b5a256acb8b
-
SHA256
3ebb62abf546e079af1f528322f908f691d6ed701db1d0624557777b5ba33a26
-
SHA512
69fa210ed00e7e0c0606363e8e7e4aad1737fac0946e9f792a839a0eff2ce1f388d1a41ad9489172c7b9e83d566f8f917637986f3fd9fe3f605c83601adc355a
-
SSDEEP
12288:cMrny90M5Br4zigJTWGKlKS8Fc9U7MpQIglkeyXBgo9VBYB86sAW:DyPUzigBcElwQIZeyXB7zCyeW
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1