General
-
Target
e725b6f76bb1dc138d7c51063acd831544c5e2ca427a6c49171caf871e7d52d7
-
Size
551KB
-
Sample
241111-lgx6gawpfx
-
MD5
85c5027917eaf0c794c973e802961419
-
SHA1
496f76b59e8d5ec7d014d01cd29db2c480c81098
-
SHA256
e725b6f76bb1dc138d7c51063acd831544c5e2ca427a6c49171caf871e7d52d7
-
SHA512
22cdb3d20df4d63b073be5e88f45043e60755d1ef073139e541a44be3fa4bb314fab8e82fd0840ac617caa152b5a63879e40b69170c6a3a1a3f0e409b789f5df
-
SSDEEP
12288:pMrEy90tp9Ib1QY17NCWMwGWFA9faVKetYKv2Wh:pyw9Ib1Q4PMwpF8A9tYKlh
Static task
static1
Behavioral task
behavioral1
Sample
e725b6f76bb1dc138d7c51063acd831544c5e2ca427a6c49171caf871e7d52d7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
e725b6f76bb1dc138d7c51063acd831544c5e2ca427a6c49171caf871e7d52d7
-
Size
551KB
-
MD5
85c5027917eaf0c794c973e802961419
-
SHA1
496f76b59e8d5ec7d014d01cd29db2c480c81098
-
SHA256
e725b6f76bb1dc138d7c51063acd831544c5e2ca427a6c49171caf871e7d52d7
-
SHA512
22cdb3d20df4d63b073be5e88f45043e60755d1ef073139e541a44be3fa4bb314fab8e82fd0840ac617caa152b5a63879e40b69170c6a3a1a3f0e409b789f5df
-
SSDEEP
12288:pMrEy90tp9Ib1QY17NCWMwGWFA9faVKetYKv2Wh:pyw9Ib1Q4PMwpF8A9tYKlh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1