General
-
Target
aed1ebd6b3c41a53769ea5b26ad0035f2393cbba5d5dbedbd747a87a037427d9N
-
Size
864KB
-
Sample
241112-btmkdszrhs
-
MD5
becdd7bf883f41c99f7eb92a0050dbe0
-
SHA1
24a8677d2ce6374f5b0df30c65f3d51f8d8da5a6
-
SHA256
aed1ebd6b3c41a53769ea5b26ad0035f2393cbba5d5dbedbd747a87a037427d9
-
SHA512
5d315f63ead6d8550ef87d4228e7495fd7542f310469524608c091e8d41f93ff8eeaeb0751814c0ab9d151ca8f1911578a89f91c423358477026f4eedf452e05
-
SSDEEP
24576:Hy4lQi3Bz7aCCc+cH26j/LNdcf5ysOLoUSy8:SM13Bz7aCn+cHr/LN6nUSy
Static task
static1
Behavioral task
behavioral1
Sample
aed1ebd6b3c41a53769ea5b26ad0035f2393cbba5d5dbedbd747a87a037427d9N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
aed1ebd6b3c41a53769ea5b26ad0035f2393cbba5d5dbedbd747a87a037427d9N
-
Size
864KB
-
MD5
becdd7bf883f41c99f7eb92a0050dbe0
-
SHA1
24a8677d2ce6374f5b0df30c65f3d51f8d8da5a6
-
SHA256
aed1ebd6b3c41a53769ea5b26ad0035f2393cbba5d5dbedbd747a87a037427d9
-
SHA512
5d315f63ead6d8550ef87d4228e7495fd7542f310469524608c091e8d41f93ff8eeaeb0751814c0ab9d151ca8f1911578a89f91c423358477026f4eedf452e05
-
SSDEEP
24576:Hy4lQi3Bz7aCCc+cH26j/LNdcf5ysOLoUSy8:SM13Bz7aCn+cHr/LN6nUSy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1