General
-
Target
61b32eada0632836400e3b23d7cf685eeb36f3e427ab6c0a142be1cadd9172ac
-
Size
647KB
-
Sample
241111-l3n5paxjdy
-
MD5
919293535a4cb969f4b6cdd632ef8bc7
-
SHA1
b7d102c6942b04f62de216fb2b26a8d80bcb364b
-
SHA256
61b32eada0632836400e3b23d7cf685eeb36f3e427ab6c0a142be1cadd9172ac
-
SHA512
5d9c7aea8fbb1c533168469f8b9bc32e758acd006a926fa7852632264c5618d7da980ad49b2dfc762399dddfa678b734851a041318e6b5a9ffaed546dd2871ba
-
SSDEEP
12288:OMrBy90eX04ZN4L79ib6clEk8vIz60CqzSeZlIiNOWwquJ1Q:/yI434n9iak8vIzRRmK6W1QQ
Static task
static1
Behavioral task
behavioral1
Sample
61b32eada0632836400e3b23d7cf685eeb36f3e427ab6c0a142be1cadd9172ac.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
61b32eada0632836400e3b23d7cf685eeb36f3e427ab6c0a142be1cadd9172ac
-
Size
647KB
-
MD5
919293535a4cb969f4b6cdd632ef8bc7
-
SHA1
b7d102c6942b04f62de216fb2b26a8d80bcb364b
-
SHA256
61b32eada0632836400e3b23d7cf685eeb36f3e427ab6c0a142be1cadd9172ac
-
SHA512
5d9c7aea8fbb1c533168469f8b9bc32e758acd006a926fa7852632264c5618d7da980ad49b2dfc762399dddfa678b734851a041318e6b5a9ffaed546dd2871ba
-
SSDEEP
12288:OMrBy90eX04ZN4L79ib6clEk8vIz60CqzSeZlIiNOWwquJ1Q:/yI434n9iak8vIzRRmK6W1QQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1