General
-
Target
c4ba30f2726b5e7b4aa096e67cabcabde99950491983d309c612bb0756abdbf4
-
Size
640KB
-
Sample
241111-adhe3a1men
-
MD5
68d4306cad00a5181ff8df97c2caaf94
-
SHA1
c06ecc83001c078d7c5c5433966f2d3cbe5984f4
-
SHA256
c4ba30f2726b5e7b4aa096e67cabcabde99950491983d309c612bb0756abdbf4
-
SHA512
b26862a1e791dea0a0673be542542f2c56a028d6c9836d12207c46db6fc46cf1e62d7736676c3eaf10105b620622a1e87fa4503a8eac828db34798cfdc10dc4a
-
SSDEEP
12288:4Mr8y90e/UjZbXx7yMMrlonFbgnx0K1iJRRci13:kyejZbXx74riFgnx7kRf13
Static task
static1
Behavioral task
behavioral1
Sample
c4ba30f2726b5e7b4aa096e67cabcabde99950491983d309c612bb0756abdbf4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
c4ba30f2726b5e7b4aa096e67cabcabde99950491983d309c612bb0756abdbf4
-
Size
640KB
-
MD5
68d4306cad00a5181ff8df97c2caaf94
-
SHA1
c06ecc83001c078d7c5c5433966f2d3cbe5984f4
-
SHA256
c4ba30f2726b5e7b4aa096e67cabcabde99950491983d309c612bb0756abdbf4
-
SHA512
b26862a1e791dea0a0673be542542f2c56a028d6c9836d12207c46db6fc46cf1e62d7736676c3eaf10105b620622a1e87fa4503a8eac828db34798cfdc10dc4a
-
SSDEEP
12288:4Mr8y90e/UjZbXx7yMMrlonFbgnx0K1iJRRci13:kyejZbXx74riFgnx7kRf13
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1