General
-
Target
3e31095fd3460a46e3a3ec1a5e3ba21b4a8102e988ef79d09b48aabbab99ecdaN.exe
-
Size
790KB
-
Sample
241112-1rxd9ascpm
-
MD5
8916f7daa548c4d6f9b46de4a2a0acb0
-
SHA1
23fe92404c02c25733137d31e6a8f862ea268d62
-
SHA256
3e31095fd3460a46e3a3ec1a5e3ba21b4a8102e988ef79d09b48aabbab99ecda
-
SHA512
e0251781196a3b941386d2c3b62f12fa413b14755074f0bee6978484593d1249938e45834303990d0905b6f107f877289c5021c0ec94b7581733ea498ca1fe69
-
SSDEEP
24576:ZytAuOcT0czQ6pjn+VeDjcE7zeR8zgFE:MtArxczvRdDjmR
Static task
static1
Behavioral task
behavioral1
Sample
3e31095fd3460a46e3a3ec1a5e3ba21b4a8102e988ef79d09b48aabbab99ecdaN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
3e31095fd3460a46e3a3ec1a5e3ba21b4a8102e988ef79d09b48aabbab99ecdaN.exe
-
Size
790KB
-
MD5
8916f7daa548c4d6f9b46de4a2a0acb0
-
SHA1
23fe92404c02c25733137d31e6a8f862ea268d62
-
SHA256
3e31095fd3460a46e3a3ec1a5e3ba21b4a8102e988ef79d09b48aabbab99ecda
-
SHA512
e0251781196a3b941386d2c3b62f12fa413b14755074f0bee6978484593d1249938e45834303990d0905b6f107f877289c5021c0ec94b7581733ea498ca1fe69
-
SSDEEP
24576:ZytAuOcT0czQ6pjn+VeDjcE7zeR8zgFE:MtArxczvRdDjmR
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1