General
-
Target
4839ba7049ee134a9d2bbf15557aa3a53b1325eddc61ba4c26e423a1e95ade65
-
Size
546KB
-
Sample
241111-l5g46a1mgq
-
MD5
febf632c407ac859153d469455e5339d
-
SHA1
29f8744c13b99bd94d454375718eae7ae44eedcc
-
SHA256
4839ba7049ee134a9d2bbf15557aa3a53b1325eddc61ba4c26e423a1e95ade65
-
SHA512
bdb37c816bcb31e8c29792f589c3f9a28866604ad39844964029f6395cec276dedcb2b05ed2ba037a38f62cc015ed469837a32a61ca0bb6d8396b16b218ea9ac
-
SSDEEP
12288:qMrey90eR2Ig79qId54psYe4JidaEIraqAE2BBlC0aG:gyN25qI/4KhwEIraqAjPlBaG
Static task
static1
Behavioral task
behavioral1
Sample
4839ba7049ee134a9d2bbf15557aa3a53b1325eddc61ba4c26e423a1e95ade65.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
4839ba7049ee134a9d2bbf15557aa3a53b1325eddc61ba4c26e423a1e95ade65
-
Size
546KB
-
MD5
febf632c407ac859153d469455e5339d
-
SHA1
29f8744c13b99bd94d454375718eae7ae44eedcc
-
SHA256
4839ba7049ee134a9d2bbf15557aa3a53b1325eddc61ba4c26e423a1e95ade65
-
SHA512
bdb37c816bcb31e8c29792f589c3f9a28866604ad39844964029f6395cec276dedcb2b05ed2ba037a38f62cc015ed469837a32a61ca0bb6d8396b16b218ea9ac
-
SSDEEP
12288:qMrey90eR2Ig79qId54psYe4JidaEIraqAE2BBlC0aG:gyN25qI/4KhwEIraqAjPlBaG
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1