General
-
Target
d385fac8ad371e9ad9ad140ab17e3c155b98d9136a5830cc013e56f478131a4a
-
Size
569KB
-
Sample
241111-gr96kavcpf
-
MD5
1bb83e958a04fbe653874e760e18401b
-
SHA1
0f21dd6826244052fdd0071a6587588715c64df5
-
SHA256
d385fac8ad371e9ad9ad140ab17e3c155b98d9136a5830cc013e56f478131a4a
-
SHA512
e83abafd4324d426ed20dbef3474f44fbe377a9194bfdf26308ca49c8f036a867f76847f71af0f452be67d884e12ea0ddb51752ae32bf280f12f8f090dbb54a5
-
SSDEEP
12288:AMruy90fahimz7AuxqVlzCx3wjnQy8JYYBL0PUH:eyasVAuxYpCx38n78+WAPy
Static task
static1
Behavioral task
behavioral1
Sample
d385fac8ad371e9ad9ad140ab17e3c155b98d9136a5830cc013e56f478131a4a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
d385fac8ad371e9ad9ad140ab17e3c155b98d9136a5830cc013e56f478131a4a
-
Size
569KB
-
MD5
1bb83e958a04fbe653874e760e18401b
-
SHA1
0f21dd6826244052fdd0071a6587588715c64df5
-
SHA256
d385fac8ad371e9ad9ad140ab17e3c155b98d9136a5830cc013e56f478131a4a
-
SHA512
e83abafd4324d426ed20dbef3474f44fbe377a9194bfdf26308ca49c8f036a867f76847f71af0f452be67d884e12ea0ddb51752ae32bf280f12f8f090dbb54a5
-
SSDEEP
12288:AMruy90fahimz7AuxqVlzCx3wjnQy8JYYBL0PUH:eyasVAuxYpCx38n78+WAPy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1