General
-
Target
bd262b3c9260580f09f1a4dc38c7b50022b2105934fc98c3b3fc1e760cee97d9
-
Size
648KB
-
Sample
241112-c5xeeatajk
-
MD5
98275efea2b72629b763c211a5178aa8
-
SHA1
ef14d1d7059b3b340467b5671809849bcd2cc62c
-
SHA256
bd262b3c9260580f09f1a4dc38c7b50022b2105934fc98c3b3fc1e760cee97d9
-
SHA512
98a701e3cbed07ff5ccfc3f122e3340180de4b5b2caa7690d71f5170358ea3144f07737eee422e0511a4436b4d0c20570cd842542c34ab619e2bfe9d7c1640a0
-
SSDEEP
12288:eMrPy90m6Ub9p/UmRU4gTV8ZB7pjfo7H6KrbyCNJzutzq9UTkIsn+r/5fvypvlCz:ZyjFpMmC4gp8BA7ac7okm3ss6vlcZNr7
Static task
static1
Behavioral task
behavioral1
Sample
bd262b3c9260580f09f1a4dc38c7b50022b2105934fc98c3b3fc1e760cee97d9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
bd262b3c9260580f09f1a4dc38c7b50022b2105934fc98c3b3fc1e760cee97d9
-
Size
648KB
-
MD5
98275efea2b72629b763c211a5178aa8
-
SHA1
ef14d1d7059b3b340467b5671809849bcd2cc62c
-
SHA256
bd262b3c9260580f09f1a4dc38c7b50022b2105934fc98c3b3fc1e760cee97d9
-
SHA512
98a701e3cbed07ff5ccfc3f122e3340180de4b5b2caa7690d71f5170358ea3144f07737eee422e0511a4436b4d0c20570cd842542c34ab619e2bfe9d7c1640a0
-
SSDEEP
12288:eMrPy90m6Ub9p/UmRU4gTV8ZB7pjfo7H6KrbyCNJzutzq9UTkIsn+r/5fvypvlCz:ZyjFpMmC4gp8BA7ac7okm3ss6vlcZNr7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1