General
-
Target
9d276a2cbf3980c8131a0f295ce8344ce99f971da01ee6a94ff7bee9256704bcN
-
Size
894KB
-
Sample
241111-1x66mswqd1
-
MD5
101d61c7ebf70375272563ad641dea60
-
SHA1
ade574384dd0ecb54f0c872d2235db373a72ad1b
-
SHA256
9d276a2cbf3980c8131a0f295ce8344ce99f971da01ee6a94ff7bee9256704bc
-
SHA512
c4b3852f4d6d76535cd56577380bc0926a37f63ca5237baff4d2edd9add402954397bfc0801f817240dbbf57a50d16c79b67f7c3634d4cd46dd9984c66e76f27
-
SSDEEP
24576:Jy9+PlDhEpWnASRIHDCfGGhmY+JEJsct0at0MzI:89gdh8WnAICDCfnB8EJjt0a+Mz
Static task
static1
Behavioral task
behavioral1
Sample
9d276a2cbf3980c8131a0f295ce8344ce99f971da01ee6a94ff7bee9256704bcN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
9d276a2cbf3980c8131a0f295ce8344ce99f971da01ee6a94ff7bee9256704bcN
-
Size
894KB
-
MD5
101d61c7ebf70375272563ad641dea60
-
SHA1
ade574384dd0ecb54f0c872d2235db373a72ad1b
-
SHA256
9d276a2cbf3980c8131a0f295ce8344ce99f971da01ee6a94ff7bee9256704bc
-
SHA512
c4b3852f4d6d76535cd56577380bc0926a37f63ca5237baff4d2edd9add402954397bfc0801f817240dbbf57a50d16c79b67f7c3634d4cd46dd9984c66e76f27
-
SSDEEP
24576:Jy9+PlDhEpWnASRIHDCfGGhmY+JEJsct0at0MzI:89gdh8WnAICDCfnB8EJjt0a+Mz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1