General
-
Target
33a27744688e28c86fbbfd0b5b2424075120bb9614adeb6fceb9e673a501ab81
-
Size
546KB
-
Sample
241111-ajl1fa1nem
-
MD5
19a9aa5a6f127a8bdf4974327373bbd1
-
SHA1
a78ff4b9f76b91a7b2d3a85d0b07b5f3bc22b3b0
-
SHA256
33a27744688e28c86fbbfd0b5b2424075120bb9614adeb6fceb9e673a501ab81
-
SHA512
5ebeaae402e3e3e9ecd686f577410674bc6d67c9fb6d343d3fa4a62f8c1ce927bdc3f061779b783f10c6556051462f0c87ce2976e88d25344b50f5f12dcb5af2
-
SSDEEP
12288:vMrUy90wfIu2mwwFuQsYeCJidavIEaqAE2B6thwg:vyrImwwFuNhuvIEaqAjEt/
Static task
static1
Behavioral task
behavioral1
Sample
33a27744688e28c86fbbfd0b5b2424075120bb9614adeb6fceb9e673a501ab81.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
33a27744688e28c86fbbfd0b5b2424075120bb9614adeb6fceb9e673a501ab81
-
Size
546KB
-
MD5
19a9aa5a6f127a8bdf4974327373bbd1
-
SHA1
a78ff4b9f76b91a7b2d3a85d0b07b5f3bc22b3b0
-
SHA256
33a27744688e28c86fbbfd0b5b2424075120bb9614adeb6fceb9e673a501ab81
-
SHA512
5ebeaae402e3e3e9ecd686f577410674bc6d67c9fb6d343d3fa4a62f8c1ce927bdc3f061779b783f10c6556051462f0c87ce2976e88d25344b50f5f12dcb5af2
-
SSDEEP
12288:vMrUy90wfIu2mwwFuQsYeCJidavIEaqAE2B6thwg:vyrImwwFuNhuvIEaqAjEt/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1