General
-
Target
547351bcc73202bc913ee41174237179ff463ba18dc05139363b672acbeaebaaN
-
Size
402KB
-
Sample
241112-eh6qnstkgt
-
MD5
e47fcfc58c4468584e458656b6a0e210
-
SHA1
f14d68655d3e9fc2e05fa2d5b1ffc0414d13b85a
-
SHA256
547351bcc73202bc913ee41174237179ff463ba18dc05139363b672acbeaebaa
-
SHA512
2a64684d8663990a3a86e67248005ba0588a8b12129333ff072f637804da126b816c0e46444a31864c23f48777530bc5e1643ab49d506120d2fc97844f66e4b8
-
SSDEEP
6144:K9y+bnr+Pp0yN90QElXz/sZAjG77XYef78JidT2CWmSUDk6S3QZaqOyQ2BQ5+:HMrDy90PlG77YegJidaaIMaqxQ2Bx
Static task
static1
Behavioral task
behavioral1
Sample
547351bcc73202bc913ee41174237179ff463ba18dc05139363b672acbeaebaaN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
547351bcc73202bc913ee41174237179ff463ba18dc05139363b672acbeaebaaN
-
Size
402KB
-
MD5
e47fcfc58c4468584e458656b6a0e210
-
SHA1
f14d68655d3e9fc2e05fa2d5b1ffc0414d13b85a
-
SHA256
547351bcc73202bc913ee41174237179ff463ba18dc05139363b672acbeaebaa
-
SHA512
2a64684d8663990a3a86e67248005ba0588a8b12129333ff072f637804da126b816c0e46444a31864c23f48777530bc5e1643ab49d506120d2fc97844f66e4b8
-
SSDEEP
6144:K9y+bnr+Pp0yN90QElXz/sZAjG77XYef78JidT2CWmSUDk6S3QZaqOyQ2BQ5+:HMrDy90PlG77YegJidaaIMaqxQ2Bx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1