General
-
Target
2d0e5d3c6be033027db101a1dd759a0499eae5459c35bfa4f39e592ceab4defe
-
Size
546KB
-
Sample
241111-af7sqsxhqm
-
MD5
66ee40d2c2b3fee6223990cf7ce7d018
-
SHA1
1efb68a82a662ed681a713a0898b89c3559e07f8
-
SHA256
2d0e5d3c6be033027db101a1dd759a0499eae5459c35bfa4f39e592ceab4defe
-
SHA512
cd81ad61302bdcd5e2de44491030d12ed2e5e700c74948e0d61e34f0deca4427fd4356058c58947e56c08063f9664f9b72f12cf1d258f4be1bb27a4b7daa9e34
-
SSDEEP
12288:sMr4y90tFqVm5VrtNchwOx9lh9sYeEJidaJIAaqAE2Bk4uZ:Ey0FqVCVZNawOxIh8JIAaqAjc
Static task
static1
Behavioral task
behavioral1
Sample
2d0e5d3c6be033027db101a1dd759a0499eae5459c35bfa4f39e592ceab4defe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
2d0e5d3c6be033027db101a1dd759a0499eae5459c35bfa4f39e592ceab4defe
-
Size
546KB
-
MD5
66ee40d2c2b3fee6223990cf7ce7d018
-
SHA1
1efb68a82a662ed681a713a0898b89c3559e07f8
-
SHA256
2d0e5d3c6be033027db101a1dd759a0499eae5459c35bfa4f39e592ceab4defe
-
SHA512
cd81ad61302bdcd5e2de44491030d12ed2e5e700c74948e0d61e34f0deca4427fd4356058c58947e56c08063f9664f9b72f12cf1d258f4be1bb27a4b7daa9e34
-
SSDEEP
12288:sMr4y90tFqVm5VrtNchwOx9lh9sYeEJidaJIAaqAE2Bk4uZ:Ey0FqVCVZNawOxIh8JIAaqAjc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1