General
-
Target
2eebc12b9052d2ebc03f471fca485a8a699a03c0c9344e624ced256b7b0ad098
-
Size
874KB
-
Sample
241111-grb9javcnh
-
MD5
3339e64d13301cd8c2be1286e96fa4b5
-
SHA1
b54c975b9553fae72dff192bd7963654a5db1199
-
SHA256
2eebc12b9052d2ebc03f471fca485a8a699a03c0c9344e624ced256b7b0ad098
-
SHA512
aff67da22b719a7b662f2a7850b832eed0921d7d07add847643b89853e711975dee3a70049a817847615abf83f567127d5e36f59570372073d586310d82d8dd2
-
SSDEEP
24576:myb6Vqw8bwOXpTY3wa+2FBTXj5lehE5LnxTeQaX:1GUwGwOXpT2wyXj5lZTxfa
Static task
static1
Behavioral task
behavioral1
Sample
2eebc12b9052d2ebc03f471fca485a8a699a03c0c9344e624ced256b7b0ad098.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
2eebc12b9052d2ebc03f471fca485a8a699a03c0c9344e624ced256b7b0ad098
-
Size
874KB
-
MD5
3339e64d13301cd8c2be1286e96fa4b5
-
SHA1
b54c975b9553fae72dff192bd7963654a5db1199
-
SHA256
2eebc12b9052d2ebc03f471fca485a8a699a03c0c9344e624ced256b7b0ad098
-
SHA512
aff67da22b719a7b662f2a7850b832eed0921d7d07add847643b89853e711975dee3a70049a817847615abf83f567127d5e36f59570372073d586310d82d8dd2
-
SSDEEP
24576:myb6Vqw8bwOXpTY3wa+2FBTXj5lehE5LnxTeQaX:1GUwGwOXpT2wyXj5lZTxfa
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1