General
-
Target
7e24b6d82dc2de00657daa3f01402642beef2b1a667b81229419be6a563eeb27
-
Size
393KB
-
Sample
241111-jhj9wswapr
-
MD5
fca5d5a77d584e0bdfc34a9ef027d218
-
SHA1
375fd16933644de1a2a02449e9be7de140634360
-
SHA256
7e24b6d82dc2de00657daa3f01402642beef2b1a667b81229419be6a563eeb27
-
SHA512
8dbdbc908aa3ec1e29ec49456af666d3861cb3ea7649b58c6f189a4be1d7547bf381d85a1eea639cdd0a249541e4b86f157d0122963d678d43ce5ba41f0c17ef
-
SSDEEP
6144:K5y+bnr+Qp0yN90QEHuwQDQix1bE4t5B9uo2D8hiu6B4v6uO02i5/:rMrIy90xQUiTEa9uuV6BcSC/
Static task
static1
Behavioral task
behavioral1
Sample
7e24b6d82dc2de00657daa3f01402642beef2b1a667b81229419be6a563eeb27.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
7e24b6d82dc2de00657daa3f01402642beef2b1a667b81229419be6a563eeb27
-
Size
393KB
-
MD5
fca5d5a77d584e0bdfc34a9ef027d218
-
SHA1
375fd16933644de1a2a02449e9be7de140634360
-
SHA256
7e24b6d82dc2de00657daa3f01402642beef2b1a667b81229419be6a563eeb27
-
SHA512
8dbdbc908aa3ec1e29ec49456af666d3861cb3ea7649b58c6f189a4be1d7547bf381d85a1eea639cdd0a249541e4b86f157d0122963d678d43ce5ba41f0c17ef
-
SSDEEP
6144:K5y+bnr+Qp0yN90QEHuwQDQix1bE4t5B9uo2D8hiu6B4v6uO02i5/:rMrIy90xQUiTEa9uuV6BcSC/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1