General
-
Target
0e26411ff9b56b5230395d4a12ad9243c2b6287c9e968dd8ba149bc1d5f4de2a
-
Size
793KB
-
Sample
241111-kwrfssxcrc
-
MD5
da3db88a8ccded0d9b55c06ea86b24ff
-
SHA1
75e8a4351c35a6716c6c7a637395ed4691203f81
-
SHA256
0e26411ff9b56b5230395d4a12ad9243c2b6287c9e968dd8ba149bc1d5f4de2a
-
SHA512
32a456c14ae694c4f946168172fc046c47eca43a7067706a261a15012f4c1eba14ddf641373dc924f95709fde2e44dfdc1279d549a78448d7928bd711caf69f0
-
SSDEEP
12288:rMrXy90QTn3uO1RwDNwXsEuWU7+sywQH31e1rnMCpM0qVPO9qW8xd:EyHuORwSXGb2cRMCpeIqWU
Static task
static1
Behavioral task
behavioral1
Sample
0e26411ff9b56b5230395d4a12ad9243c2b6287c9e968dd8ba149bc1d5f4de2a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
0e26411ff9b56b5230395d4a12ad9243c2b6287c9e968dd8ba149bc1d5f4de2a
-
Size
793KB
-
MD5
da3db88a8ccded0d9b55c06ea86b24ff
-
SHA1
75e8a4351c35a6716c6c7a637395ed4691203f81
-
SHA256
0e26411ff9b56b5230395d4a12ad9243c2b6287c9e968dd8ba149bc1d5f4de2a
-
SHA512
32a456c14ae694c4f946168172fc046c47eca43a7067706a261a15012f4c1eba14ddf641373dc924f95709fde2e44dfdc1279d549a78448d7928bd711caf69f0
-
SSDEEP
12288:rMrXy90QTn3uO1RwDNwXsEuWU7+sywQH31e1rnMCpM0qVPO9qW8xd:EyHuORwSXGb2cRMCpeIqWU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1