General
-
Target
2bbfc58a08debe2f05a261bc60111f93cfe78247909b2c95b9ebf06f001a8c9b
-
Size
894KB
-
Sample
241111-hzh8gsvgjn
-
MD5
4ec6c3fb84f4b31e8a227241202a971c
-
SHA1
d392bbdc73e659d723622bebc4040ee01347c964
-
SHA256
2bbfc58a08debe2f05a261bc60111f93cfe78247909b2c95b9ebf06f001a8c9b
-
SHA512
ff63983de998cddb630f37c775163b12dbebffaa76699e3f1bac86e623f0c9e77cf83dd594e1e73f1f1deec909fc0a904aa2dfef1ae7a393714863dea4152fea
-
SSDEEP
24576:+ySs/HVmvdmYsPIR+HqBTklJataSs0Ti:NSgHgv/0TKhkPaA0T
Static task
static1
Behavioral task
behavioral1
Sample
2bbfc58a08debe2f05a261bc60111f93cfe78247909b2c95b9ebf06f001a8c9b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
2bbfc58a08debe2f05a261bc60111f93cfe78247909b2c95b9ebf06f001a8c9b
-
Size
894KB
-
MD5
4ec6c3fb84f4b31e8a227241202a971c
-
SHA1
d392bbdc73e659d723622bebc4040ee01347c964
-
SHA256
2bbfc58a08debe2f05a261bc60111f93cfe78247909b2c95b9ebf06f001a8c9b
-
SHA512
ff63983de998cddb630f37c775163b12dbebffaa76699e3f1bac86e623f0c9e77cf83dd594e1e73f1f1deec909fc0a904aa2dfef1ae7a393714863dea4152fea
-
SSDEEP
24576:+ySs/HVmvdmYsPIR+HqBTklJataSs0Ti:NSgHgv/0TKhkPaA0T
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1