General
-
Target
a450298fda354f22953dda8ada4fe5f83c723112a4301685f372dfe52aa46cf5
-
Size
1.2MB
-
Sample
241111-h39jvaynfr
-
MD5
90a7d9ae4a712ecdf2637ec3e2c55fae
-
SHA1
825ea46eefdf9385d5606c400d4ec25c6fd4d2b9
-
SHA256
a450298fda354f22953dda8ada4fe5f83c723112a4301685f372dfe52aa46cf5
-
SHA512
31e6b98ac910514b2c986a6b391d9cb84dd69a54e5b71f53d3429a119de3aa4ee656cd5ba1400322b5e9e475aeb07b376c48dd8f4c662bfe7b0dd1370d40d639
-
SSDEEP
24576:d8cZSlf/nIdy4Ta/JYb6qdj3D/ytw8Emuac06l8+sj9H:d8cZSJ+ORYeYDqngTl8+c
Static task
static1
Behavioral task
behavioral1
Sample
a450298fda354f22953dda8ada4fe5f83c723112a4301685f372dfe52aa46cf5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a450298fda354f22953dda8ada4fe5f83c723112a4301685f372dfe52aa46cf5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
a450298fda354f22953dda8ada4fe5f83c723112a4301685f372dfe52aa46cf5
-
Size
1.2MB
-
MD5
90a7d9ae4a712ecdf2637ec3e2c55fae
-
SHA1
825ea46eefdf9385d5606c400d4ec25c6fd4d2b9
-
SHA256
a450298fda354f22953dda8ada4fe5f83c723112a4301685f372dfe52aa46cf5
-
SHA512
31e6b98ac910514b2c986a6b391d9cb84dd69a54e5b71f53d3429a119de3aa4ee656cd5ba1400322b5e9e475aeb07b376c48dd8f4c662bfe7b0dd1370d40d639
-
SSDEEP
24576:d8cZSlf/nIdy4Ta/JYb6qdj3D/ytw8Emuac06l8+sj9H:d8cZSJ+ORYeYDqngTl8+c
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1