General
-
Target
ef8e392ccb4053e6ce4918d93a5e907dc3c296a83598b3d5305c2cd6dab05ff7N.exe
-
Size
731KB
-
Sample
241112-kz4wasyhpj
-
MD5
8878f7f9ed00bec39c0556343123eda8
-
SHA1
e3b567f742895707ac75be3eeae1806f6bef9c33
-
SHA256
deb6f472472da28fd83af538d536dc6fd50a87008cbcbc42d76861a2d768b935
-
SHA512
f693148d053fb327165f9d90811d582962247458c127420ee4d10aab9dfcead98884820ca08980ecb09a67c39c2cfbb7d4ca1a7acefec554190c2bc3af1da0c5
-
SSDEEP
12288:2Mrdy90+IVdjWgVBpzt9tmZh28cGz30wtI2t7IhGWmxbjXHZjGhmYf:TyUV9WgVBpzt9Eh2mzkwtII7JWC9Ghf
Static task
static1
Behavioral task
behavioral1
Sample
ef8e392ccb4053e6ce4918d93a5e907dc3c296a83598b3d5305c2cd6dab05ff7N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
ef8e392ccb4053e6ce4918d93a5e907dc3c296a83598b3d5305c2cd6dab05ff7N.exe
-
Size
731KB
-
MD5
8878f7f9ed00bec39c0556343123eda8
-
SHA1
e3b567f742895707ac75be3eeae1806f6bef9c33
-
SHA256
deb6f472472da28fd83af538d536dc6fd50a87008cbcbc42d76861a2d768b935
-
SHA512
f693148d053fb327165f9d90811d582962247458c127420ee4d10aab9dfcead98884820ca08980ecb09a67c39c2cfbb7d4ca1a7acefec554190c2bc3af1da0c5
-
SSDEEP
12288:2Mrdy90+IVdjWgVBpzt9tmZh28cGz30wtI2t7IhGWmxbjXHZjGhmYf:TyUV9WgVBpzt9Eh2mzkwtII7JWC9Ghf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1