General
-
Target
73ead12466d7d18188cecf24f79c269ea7e4ef7c075c3ba93b3dea9e798570ec
-
Size
1.0MB
-
Sample
241111-m39l3ayfjh
-
MD5
271f6121f1cdf78d35cc16f123f66302
-
SHA1
7e21893576cbb04d27e1efeb0a901ca47f685272
-
SHA256
73ead12466d7d18188cecf24f79c269ea7e4ef7c075c3ba93b3dea9e798570ec
-
SHA512
c3ed4985ff5e1bcd0fdcaddc770db7e1edcfa419e94b04d64fcb7614bfe8f82685a81258e7dbd7f0c6518a6e98e00f5cbf199d9828cacdb3ea8fdd7d08bcf3f2
-
SSDEEP
24576:rEBb3XCrU5gVN4m1eGqMflGWcqDXixIPzge0ftWP7:SiEgV6m1eGNXc1x+ctM
Static task
static1
Behavioral task
behavioral1
Sample
73ead12466d7d18188cecf24f79c269ea7e4ef7c075c3ba93b3dea9e798570ec.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
73ead12466d7d18188cecf24f79c269ea7e4ef7c075c3ba93b3dea9e798570ec.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
73ead12466d7d18188cecf24f79c269ea7e4ef7c075c3ba93b3dea9e798570ec
-
Size
1.0MB
-
MD5
271f6121f1cdf78d35cc16f123f66302
-
SHA1
7e21893576cbb04d27e1efeb0a901ca47f685272
-
SHA256
73ead12466d7d18188cecf24f79c269ea7e4ef7c075c3ba93b3dea9e798570ec
-
SHA512
c3ed4985ff5e1bcd0fdcaddc770db7e1edcfa419e94b04d64fcb7614bfe8f82685a81258e7dbd7f0c6518a6e98e00f5cbf199d9828cacdb3ea8fdd7d08bcf3f2
-
SSDEEP
24576:rEBb3XCrU5gVN4m1eGqMflGWcqDXixIPzge0ftWP7:SiEgV6m1eGNXc1x+ctM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1