General
-
Target
a97abb7fa0d9365df8a8d3e7e517200ce0b95d73619f70c3f04b40c997c85fab
-
Size
546KB
-
Sample
241111-hqs2bsymaj
-
MD5
d2de6485102c942ee429cae83c2874c2
-
SHA1
0de6b1d2f3a3413a9b7a73d28df9b51c07ff3279
-
SHA256
a97abb7fa0d9365df8a8d3e7e517200ce0b95d73619f70c3f04b40c997c85fab
-
SHA512
c8167e8bc6420947dc928d913930927b29dff6bb3b004cfa33443a614e8112c3bdf0de344abb34f6ba45c1ff111551fc594011c8a8755d5f824b302e6cdd98b5
-
SSDEEP
12288:DMr/y90KiQVi2q+T+KNgF3sYecJidagI3aqAE2BQxeT0asS:kyxVi9+Tvg+hUgI3aqAj2+
Static task
static1
Behavioral task
behavioral1
Sample
a97abb7fa0d9365df8a8d3e7e517200ce0b95d73619f70c3f04b40c997c85fab.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
a97abb7fa0d9365df8a8d3e7e517200ce0b95d73619f70c3f04b40c997c85fab
-
Size
546KB
-
MD5
d2de6485102c942ee429cae83c2874c2
-
SHA1
0de6b1d2f3a3413a9b7a73d28df9b51c07ff3279
-
SHA256
a97abb7fa0d9365df8a8d3e7e517200ce0b95d73619f70c3f04b40c997c85fab
-
SHA512
c8167e8bc6420947dc928d913930927b29dff6bb3b004cfa33443a614e8112c3bdf0de344abb34f6ba45c1ff111551fc594011c8a8755d5f824b302e6cdd98b5
-
SSDEEP
12288:DMr/y90KiQVi2q+T+KNgF3sYecJidagI3aqAE2BQxeT0asS:kyxVi9+Tvg+hUgI3aqAj2+
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1