General
-
Target
a8f60aa331c5210a7bb27203ad5b02e69af61f4a6898a1f6f739b001da181c86
-
Size
569KB
-
Sample
241111-namr9sydpm
-
MD5
eda9fb1c244c918f247f4f6dbe46965e
-
SHA1
155be61978f2f8d97c40813254c0c5adb5e1dcdd
-
SHA256
a8f60aa331c5210a7bb27203ad5b02e69af61f4a6898a1f6f739b001da181c86
-
SHA512
981929e162f7992482c15adf114b09b5f227bab804dff5c38b84af43d0954e31933fa0ff1bfdcd501b0734ba1ad29b2412de118e2563d062fdd1584a6a15fdff
-
SSDEEP
12288:FMrCy90iahimz7AuxqVP+crH2Sywzcr/fzha10U/89:jyDsVAuxYPX2SlzYnNtU/M
Static task
static1
Behavioral task
behavioral1
Sample
a8f60aa331c5210a7bb27203ad5b02e69af61f4a6898a1f6f739b001da181c86.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
a8f60aa331c5210a7bb27203ad5b02e69af61f4a6898a1f6f739b001da181c86
-
Size
569KB
-
MD5
eda9fb1c244c918f247f4f6dbe46965e
-
SHA1
155be61978f2f8d97c40813254c0c5adb5e1dcdd
-
SHA256
a8f60aa331c5210a7bb27203ad5b02e69af61f4a6898a1f6f739b001da181c86
-
SHA512
981929e162f7992482c15adf114b09b5f227bab804dff5c38b84af43d0954e31933fa0ff1bfdcd501b0734ba1ad29b2412de118e2563d062fdd1584a6a15fdff
-
SSDEEP
12288:FMrCy90iahimz7AuxqVP+crH2Sywzcr/fzha10U/89:jyDsVAuxYPX2SlzYnNtU/M
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1