General
-
Target
697fd05025dc4dc83db748d50e3c07d01fddab662decf0a5200616f1037b6d80
-
Size
568KB
-
Sample
241111-jp4xwayrhq
-
MD5
d46d44dbbc8e8b225bcea5f247d12701
-
SHA1
c8338d5e2ee61c5103a9ae1ccf9cb3e149621b97
-
SHA256
697fd05025dc4dc83db748d50e3c07d01fddab662decf0a5200616f1037b6d80
-
SHA512
b60c31b4199d5c892bdaab1c7a3d49f957ef55ed8d33ccd5f3105e04d0e2b6bb0548e4e207a4376007ffd0571797555eb4a4a97a30fa8a3fba0ebfe02ffccd51
-
SSDEEP
12288:aMrUy90Wahimz7AuxqV4t9+j8zJA7J4Fh3AxMt01UbO2r8Ye:2ynsVAuxYJj8QJs3AetjxrE
Static task
static1
Behavioral task
behavioral1
Sample
697fd05025dc4dc83db748d50e3c07d01fddab662decf0a5200616f1037b6d80.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
697fd05025dc4dc83db748d50e3c07d01fddab662decf0a5200616f1037b6d80
-
Size
568KB
-
MD5
d46d44dbbc8e8b225bcea5f247d12701
-
SHA1
c8338d5e2ee61c5103a9ae1ccf9cb3e149621b97
-
SHA256
697fd05025dc4dc83db748d50e3c07d01fddab662decf0a5200616f1037b6d80
-
SHA512
b60c31b4199d5c892bdaab1c7a3d49f957ef55ed8d33ccd5f3105e04d0e2b6bb0548e4e207a4376007ffd0571797555eb4a4a97a30fa8a3fba0ebfe02ffccd51
-
SSDEEP
12288:aMrUy90Wahimz7AuxqV4t9+j8zJA7J4Fh3AxMt01UbO2r8Ye:2ynsVAuxYJj8QJs3AetjxrE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1