General
-
Target
d2103cc20f4b76a951bca7bd2bb708482085fc4580536943816836f1d0156434
-
Size
861KB
-
Sample
241111-l7663a1nbq
-
MD5
2c3f07d7216f0aba7588b27578db06c4
-
SHA1
017db98ad0d0bc7e47304a66070d82fdaa8d8a37
-
SHA256
d2103cc20f4b76a951bca7bd2bb708482085fc4580536943816836f1d0156434
-
SHA512
1430d1010ea826e8ce164b85e35c22e586d6c9f7573414f496f972a00f6deacc08940c56fef7acf762c4faf07d39c628a02bece74df516c1e1526e68087e4947
-
SSDEEP
12288:yMrsy90gtWfjDGIGyzw2oiNWTcGOkbYhTZpKn+LnusLWz0tIQVj8DxUlI1ld5HBS:2yXTIGS/RgcGVbYVZpKn+rusiani1lI
Static task
static1
Behavioral task
behavioral1
Sample
d2103cc20f4b76a951bca7bd2bb708482085fc4580536943816836f1d0156434.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
d2103cc20f4b76a951bca7bd2bb708482085fc4580536943816836f1d0156434
-
Size
861KB
-
MD5
2c3f07d7216f0aba7588b27578db06c4
-
SHA1
017db98ad0d0bc7e47304a66070d82fdaa8d8a37
-
SHA256
d2103cc20f4b76a951bca7bd2bb708482085fc4580536943816836f1d0156434
-
SHA512
1430d1010ea826e8ce164b85e35c22e586d6c9f7573414f496f972a00f6deacc08940c56fef7acf762c4faf07d39c628a02bece74df516c1e1526e68087e4947
-
SSDEEP
12288:yMrsy90gtWfjDGIGyzw2oiNWTcGOkbYhTZpKn+LnusLWz0tIQVj8DxUlI1ld5HBS:2yXTIGS/RgcGVbYVZpKn+rusiani1lI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1