General
-
Target
974483df9abfd211b4017c6aaf003e4827af92e707536a405f5c38c972b3b44a
-
Size
577KB
-
Sample
241111-j2j38swdmj
-
MD5
a9163e60c035ae4b799df4dbb105a308
-
SHA1
dba44eabf4af0405c6ee135b89f2396c1e3938e9
-
SHA256
974483df9abfd211b4017c6aaf003e4827af92e707536a405f5c38c972b3b44a
-
SHA512
26af50b999196e4dadf0b242bf0af1b41c0224bfbefde9414e5103966390533367231a0cd4b6305c17681eacb9991d396dc29b3316c5092e83ea71c53c5af35b
-
SSDEEP
12288:CMriy900ahimz7AuxqVtc0kyjYtPkxhGneUpuI1fAWd4K:AyBsVAuxYyustPkSeUMIxA4
Static task
static1
Behavioral task
behavioral1
Sample
974483df9abfd211b4017c6aaf003e4827af92e707536a405f5c38c972b3b44a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
974483df9abfd211b4017c6aaf003e4827af92e707536a405f5c38c972b3b44a
-
Size
577KB
-
MD5
a9163e60c035ae4b799df4dbb105a308
-
SHA1
dba44eabf4af0405c6ee135b89f2396c1e3938e9
-
SHA256
974483df9abfd211b4017c6aaf003e4827af92e707536a405f5c38c972b3b44a
-
SHA512
26af50b999196e4dadf0b242bf0af1b41c0224bfbefde9414e5103966390533367231a0cd4b6305c17681eacb9991d396dc29b3316c5092e83ea71c53c5af35b
-
SSDEEP
12288:CMriy900ahimz7AuxqVtc0kyjYtPkxhGneUpuI1fAWd4K:AyBsVAuxYyustPkSeUMIxA4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1