General
-
Target
ee44ecf5a3826e3efeeb76128d8727b5d94b0b68fe0d94dc97439c99c39dce0b
-
Size
546KB
-
Sample
241112-e8ed4svgkg
-
MD5
f3e9704c3687857a64c294265c4a127b
-
SHA1
f229681bd3697f4e3784a88cbdb2d389acdf02f0
-
SHA256
ee44ecf5a3826e3efeeb76128d8727b5d94b0b68fe0d94dc97439c99c39dce0b
-
SHA512
e13449d7979a760bc25039b1f68caaa994cacbf1e00a15ae18f3e8c4c0cecd5f2817d5952da60cbde1dd1b89798f263a0e670d4aad2570a342ab9952a21e9375
-
SSDEEP
12288:ZMrWy906XkV2De5MmsrMwsYemJidajIYaqAE2Buul21:zyOV2i5MIhijIYaqAjgul8
Static task
static1
Behavioral task
behavioral1
Sample
ee44ecf5a3826e3efeeb76128d8727b5d94b0b68fe0d94dc97439c99c39dce0b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
ee44ecf5a3826e3efeeb76128d8727b5d94b0b68fe0d94dc97439c99c39dce0b
-
Size
546KB
-
MD5
f3e9704c3687857a64c294265c4a127b
-
SHA1
f229681bd3697f4e3784a88cbdb2d389acdf02f0
-
SHA256
ee44ecf5a3826e3efeeb76128d8727b5d94b0b68fe0d94dc97439c99c39dce0b
-
SHA512
e13449d7979a760bc25039b1f68caaa994cacbf1e00a15ae18f3e8c4c0cecd5f2817d5952da60cbde1dd1b89798f263a0e670d4aad2570a342ab9952a21e9375
-
SSDEEP
12288:ZMrWy906XkV2De5MmsrMwsYemJidajIYaqAE2Buul21:zyOV2i5MIhijIYaqAjgul8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1