General
-
Target
e8a10a7c507ee5bcad1209baa92c9334c35ea5bdb16a74a1e763bb939e9ccb2f
-
Size
1.2MB
-
Sample
241111-bsxc7ssnfk
-
MD5
1aa19e1709f5bf79aae55375110077b4
-
SHA1
51d01e2308e868be50bd3af35bd8262f3636a442
-
SHA256
e8a10a7c507ee5bcad1209baa92c9334c35ea5bdb16a74a1e763bb939e9ccb2f
-
SHA512
dc2f69e88cfd42332fa2cd9a8e8d9ce06010d7b9da356b43dbfcb9f616cb23534d6534c7b715c3dab4b0ead4198e987d1cd205de90da7af19ee76ccaa502df51
-
SSDEEP
24576:+pQsfGjoufGJCgl9KDJU4x3FZHlc0nQAI7Hu7ecHHMnnxPiH7S:+h+0ufGQgl9ybfH2qQ1LqHohiH
Static task
static1
Behavioral task
behavioral1
Sample
e8a10a7c507ee5bcad1209baa92c9334c35ea5bdb16a74a1e763bb939e9ccb2f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e8a10a7c507ee5bcad1209baa92c9334c35ea5bdb16a74a1e763bb939e9ccb2f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
e8a10a7c507ee5bcad1209baa92c9334c35ea5bdb16a74a1e763bb939e9ccb2f
-
Size
1.2MB
-
MD5
1aa19e1709f5bf79aae55375110077b4
-
SHA1
51d01e2308e868be50bd3af35bd8262f3636a442
-
SHA256
e8a10a7c507ee5bcad1209baa92c9334c35ea5bdb16a74a1e763bb939e9ccb2f
-
SHA512
dc2f69e88cfd42332fa2cd9a8e8d9ce06010d7b9da356b43dbfcb9f616cb23534d6534c7b715c3dab4b0ead4198e987d1cd205de90da7af19ee76ccaa502df51
-
SSDEEP
24576:+pQsfGjoufGJCgl9KDJU4x3FZHlc0nQAI7Hu7ecHHMnnxPiH7S:+h+0ufGQgl9ybfH2qQ1LqHohiH
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1