General
-
Target
4dc1a63c87365053579985aaa8823ec3466312dc032bf6b2ccd559e1208aaf40
-
Size
550KB
-
Sample
241111-ka5fjazmcn
-
MD5
bfab8b7e2de7e4035f1baa105e013f5b
-
SHA1
c6b42276b655bb0b5ced627cabc54c55fed71e2b
-
SHA256
4dc1a63c87365053579985aaa8823ec3466312dc032bf6b2ccd559e1208aaf40
-
SHA512
652d41de3a6ab557bd71d88407a0c6cb97d64d3abf15af3588c0fc3a95cb4d0bf6aa74aa379e4e635e56da3abd1e0523c84262066992309d7d18611c40376ab8
-
SSDEEP
12288:TMrpy901lfH+FtZCBWNQddgqzQe0mFrMrlwHJjKd8:WySfHstcBWNQRJ0wHJje8
Static task
static1
Behavioral task
behavioral1
Sample
4dc1a63c87365053579985aaa8823ec3466312dc032bf6b2ccd559e1208aaf40.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
4dc1a63c87365053579985aaa8823ec3466312dc032bf6b2ccd559e1208aaf40
-
Size
550KB
-
MD5
bfab8b7e2de7e4035f1baa105e013f5b
-
SHA1
c6b42276b655bb0b5ced627cabc54c55fed71e2b
-
SHA256
4dc1a63c87365053579985aaa8823ec3466312dc032bf6b2ccd559e1208aaf40
-
SHA512
652d41de3a6ab557bd71d88407a0c6cb97d64d3abf15af3588c0fc3a95cb4d0bf6aa74aa379e4e635e56da3abd1e0523c84262066992309d7d18611c40376ab8
-
SSDEEP
12288:TMrpy901lfH+FtZCBWNQddgqzQe0mFrMrlwHJjKd8:WySfHstcBWNQRJ0wHJje8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1