General
-
Target
6633489e112b6a5639de93348abc5a2c21d7807ee005c747555ebbd1ce5bc71e
-
Size
568KB
-
Sample
241111-myvmca1rdq
-
MD5
802e58bdf5eaa614edb409f419ee9c11
-
SHA1
eaed289fe4ab6821cdeb2df535d7bfd02a80f1ef
-
SHA256
6633489e112b6a5639de93348abc5a2c21d7807ee005c747555ebbd1ce5bc71e
-
SHA512
a1848b96b13be7f211444f651e834f0be5d125792d7f29d55a55a2002cfe06f6fe2344d5eb8af15c95b7e37cde1fdbb8866596b12976c9f8d46c45ddbc7b37bc
-
SSDEEP
6144:Koy+bnr+ep0yN90QEgEKp2ihfA9E0mFlP5JRZ+Ruz9SLMXqfeOOFb6+gRoN2cPBs:0Mr+y90bahimz7AuxqV3+B243Khv
Static task
static1
Behavioral task
behavioral1
Sample
6633489e112b6a5639de93348abc5a2c21d7807ee005c747555ebbd1ce5bc71e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
6633489e112b6a5639de93348abc5a2c21d7807ee005c747555ebbd1ce5bc71e
-
Size
568KB
-
MD5
802e58bdf5eaa614edb409f419ee9c11
-
SHA1
eaed289fe4ab6821cdeb2df535d7bfd02a80f1ef
-
SHA256
6633489e112b6a5639de93348abc5a2c21d7807ee005c747555ebbd1ce5bc71e
-
SHA512
a1848b96b13be7f211444f651e834f0be5d125792d7f29d55a55a2002cfe06f6fe2344d5eb8af15c95b7e37cde1fdbb8866596b12976c9f8d46c45ddbc7b37bc
-
SSDEEP
6144:Koy+bnr+ep0yN90QEgEKp2ihfA9E0mFlP5JRZ+Ruz9SLMXqfeOOFb6+gRoN2cPBs:0Mr+y90bahimz7AuxqV3+B243Khv
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1