General
-
Target
4a09b6b29388dc994003e657854f11eaf978ebde7913d0290db8003d64543f2d
-
Size
864KB
-
Sample
241111-ld8sssxcnm
-
MD5
cca4c95a71818e91dc9e3dbe94220a6a
-
SHA1
eccbe7f31c4af4c1aa7dbdb419f1d7cf3fab4ee3
-
SHA256
4a09b6b29388dc994003e657854f11eaf978ebde7913d0290db8003d64543f2d
-
SHA512
f03e921ca3c66f2daf0d909b19a65d7ca665eeb910f288462fc0912e7364dce208a2433b41198ecc257e89343dcf3f274f6a49ea1d7431f3ff9cc001fbdec76e
-
SSDEEP
24576:uyNwtm4d6baZWmtQQl+4CxOASNnM950o/5TX:9NwtybP9QI4CU3NMvN
Static task
static1
Behavioral task
behavioral1
Sample
4a09b6b29388dc994003e657854f11eaf978ebde7913d0290db8003d64543f2d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
4a09b6b29388dc994003e657854f11eaf978ebde7913d0290db8003d64543f2d
-
Size
864KB
-
MD5
cca4c95a71818e91dc9e3dbe94220a6a
-
SHA1
eccbe7f31c4af4c1aa7dbdb419f1d7cf3fab4ee3
-
SHA256
4a09b6b29388dc994003e657854f11eaf978ebde7913d0290db8003d64543f2d
-
SHA512
f03e921ca3c66f2daf0d909b19a65d7ca665eeb910f288462fc0912e7364dce208a2433b41198ecc257e89343dcf3f274f6a49ea1d7431f3ff9cc001fbdec76e
-
SSDEEP
24576:uyNwtm4d6baZWmtQQl+4CxOASNnM950o/5TX:9NwtybP9QI4CU3NMvN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1