General
-
Target
3549f5aeeeb79ca27033813c6850a8808ff65db2ccddfeb0cb3e0998acce87ccN
-
Size
667KB
-
Sample
241112-hfee7axcjj
-
MD5
f7312033c4f64db37b6de9d0cd979870
-
SHA1
9ab27e5fa070e0e86bb0b167cb76d52663630d28
-
SHA256
3549f5aeeeb79ca27033813c6850a8808ff65db2ccddfeb0cb3e0998acce87cc
-
SHA512
d2637b3e23545ea1c645e3a3fa22ee1c444d5c208ec6d8d23538dd5588165c2d99cb1b52d1371bcbda836833533c4bd34e566738bb6dea944b9b6e0e14bcd32b
-
SSDEEP
12288:/MrXy90y7rqV0hfUzmd6LgvPK+035SVemCxWe+MeVuRs0dVYs7:oylA0xbPK+04Vejl+78RZrT7
Static task
static1
Behavioral task
behavioral1
Sample
3549f5aeeeb79ca27033813c6850a8808ff65db2ccddfeb0cb3e0998acce87ccN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
3549f5aeeeb79ca27033813c6850a8808ff65db2ccddfeb0cb3e0998acce87ccN
-
Size
667KB
-
MD5
f7312033c4f64db37b6de9d0cd979870
-
SHA1
9ab27e5fa070e0e86bb0b167cb76d52663630d28
-
SHA256
3549f5aeeeb79ca27033813c6850a8808ff65db2ccddfeb0cb3e0998acce87cc
-
SHA512
d2637b3e23545ea1c645e3a3fa22ee1c444d5c208ec6d8d23538dd5588165c2d99cb1b52d1371bcbda836833533c4bd34e566738bb6dea944b9b6e0e14bcd32b
-
SSDEEP
12288:/MrXy90y7rqV0hfUzmd6LgvPK+035SVemCxWe+MeVuRs0dVYs7:oylA0xbPK+04Vejl+78RZrT7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1