General
-
Target
764aaa82271c5e564a88203e82d0549824bb84d1fd286a82fdf3d02813b560ee
-
Size
812KB
-
Sample
241111-h7xqvaypbq
-
MD5
6644d44e9bbdccbee3961826e59d757c
-
SHA1
923c8a2c81a908e7bbf08b44bbafd12aee97ac83
-
SHA256
764aaa82271c5e564a88203e82d0549824bb84d1fd286a82fdf3d02813b560ee
-
SHA512
356a3ac867dd2e0ba2e2ca35016fe63ec01725171d59d476c137754700a3ee1c27cf7183e43165d3029ed150b394d049acea23be3b797b32cd721f46ca53a4ef
-
SSDEEP
24576:oytC/rktaLhn4z+4ig77xTmfd2HykYFb8Aha:vtCZL8igxTmfIHyv
Static task
static1
Behavioral task
behavioral1
Sample
764aaa82271c5e564a88203e82d0549824bb84d1fd286a82fdf3d02813b560ee.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
764aaa82271c5e564a88203e82d0549824bb84d1fd286a82fdf3d02813b560ee
-
Size
812KB
-
MD5
6644d44e9bbdccbee3961826e59d757c
-
SHA1
923c8a2c81a908e7bbf08b44bbafd12aee97ac83
-
SHA256
764aaa82271c5e564a88203e82d0549824bb84d1fd286a82fdf3d02813b560ee
-
SHA512
356a3ac867dd2e0ba2e2ca35016fe63ec01725171d59d476c137754700a3ee1c27cf7183e43165d3029ed150b394d049acea23be3b797b32cd721f46ca53a4ef
-
SSDEEP
24576:oytC/rktaLhn4z+4ig77xTmfd2HykYFb8Aha:vtCZL8igxTmfIHyv
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1