General
-
Target
69678e1bc660deab2bdfa2dcc4ee95069a725f19933046894aca2cdd3fea9254
-
Size
790KB
-
Sample
241111-ca1hkstjaq
-
MD5
09200d4b218abdd0c56460f0ff93d3e3
-
SHA1
9bb57982852e90e3b11bc2aad52e36538f0baf3b
-
SHA256
69678e1bc660deab2bdfa2dcc4ee95069a725f19933046894aca2cdd3fea9254
-
SHA512
c5f621ddd1f2f45fa5efa53342edecfa12be24cc5366ed4f4e8b489276b81707c524cc00c073d0285946de42ad301e9acc1bd13aea3c16e52949a64ce05d9ca5
-
SSDEEP
12288:NMrXy90A+eUV47yp1UgvoGhdRZumG4ViU8H9vlM0YRPamUpM:Ky9UVn1047ZumsXM0YBUM
Static task
static1
Behavioral task
behavioral1
Sample
69678e1bc660deab2bdfa2dcc4ee95069a725f19933046894aca2cdd3fea9254.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
69678e1bc660deab2bdfa2dcc4ee95069a725f19933046894aca2cdd3fea9254
-
Size
790KB
-
MD5
09200d4b218abdd0c56460f0ff93d3e3
-
SHA1
9bb57982852e90e3b11bc2aad52e36538f0baf3b
-
SHA256
69678e1bc660deab2bdfa2dcc4ee95069a725f19933046894aca2cdd3fea9254
-
SHA512
c5f621ddd1f2f45fa5efa53342edecfa12be24cc5366ed4f4e8b489276b81707c524cc00c073d0285946de42ad301e9acc1bd13aea3c16e52949a64ce05d9ca5
-
SSDEEP
12288:NMrXy90A+eUV47yp1UgvoGhdRZumG4ViU8H9vlM0YRPamUpM:Ky9UVn1047ZumsXM0YBUM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1