General
-
Target
d611ab7ee54ebe5d6b1321effac7e37989a6b92f9df5f1e067dab733fa540074
-
Size
695KB
-
Sample
241111-hr1skatrfx
-
MD5
4b571dfa48ab968aca441f5672cc6b07
-
SHA1
601f2391968127e147a5b17b34f30f34a1b745d8
-
SHA256
d611ab7ee54ebe5d6b1321effac7e37989a6b92f9df5f1e067dab733fa540074
-
SHA512
674c48eef1ac21366e6d81d58b41ff7ec1d9d7f8ef1872383d4b0b100c7f6534124a6eb11a9568df0e2ad7351a31c7ebadc7044905f41312f02885199b44db0b
-
SSDEEP
12288:pMrRy90hqXsNgX0S0K0I9mGJtWd+c3QK2+6tIg0wiyc/ED/0mQsc2zBsHr1gIeL:syZwC703I1tWT3Qb+6tIgoy5YmDc2z+c
Static task
static1
Behavioral task
behavioral1
Sample
d611ab7ee54ebe5d6b1321effac7e37989a6b92f9df5f1e067dab733fa540074.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
d611ab7ee54ebe5d6b1321effac7e37989a6b92f9df5f1e067dab733fa540074
-
Size
695KB
-
MD5
4b571dfa48ab968aca441f5672cc6b07
-
SHA1
601f2391968127e147a5b17b34f30f34a1b745d8
-
SHA256
d611ab7ee54ebe5d6b1321effac7e37989a6b92f9df5f1e067dab733fa540074
-
SHA512
674c48eef1ac21366e6d81d58b41ff7ec1d9d7f8ef1872383d4b0b100c7f6534124a6eb11a9568df0e2ad7351a31c7ebadc7044905f41312f02885199b44db0b
-
SSDEEP
12288:pMrRy90hqXsNgX0S0K0I9mGJtWd+c3QK2+6tIg0wiyc/ED/0mQsc2zBsHr1gIeL:syZwC703I1tWT3Qb+6tIgoy5YmDc2z+c
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1