General
-
Target
69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N
-
Size
668KB
-
Sample
241112-l44a1ayqhs
-
MD5
24fc775b23074d6e1e842eadc3b15b50
-
SHA1
247f48a3c6f07aa6c324c7eff01d83776ba34c33
-
SHA256
69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7
-
SHA512
7e118c728d87ea0c10b3fb0024b0dacebeab163c1b46e479ca5231b994ed8f42986220276c9dee09b5bde582879f6e29a0705cb9a18d3a3e3b9505108437bafc
-
SSDEEP
12288:kMrBy90hLhwkslnczmdgLgvPK+03d+qDxWe+MeVuZsEd232:Ny2LCltPK+0UqVl+78Zx9
Static task
static1
Behavioral task
behavioral1
Sample
69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N
-
Size
668KB
-
MD5
24fc775b23074d6e1e842eadc3b15b50
-
SHA1
247f48a3c6f07aa6c324c7eff01d83776ba34c33
-
SHA256
69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7
-
SHA512
7e118c728d87ea0c10b3fb0024b0dacebeab163c1b46e479ca5231b994ed8f42986220276c9dee09b5bde582879f6e29a0705cb9a18d3a3e3b9505108437bafc
-
SSDEEP
12288:kMrBy90hLhwkslnczmdgLgvPK+03d+qDxWe+MeVuZsEd232:Ny2LCltPK+0UqVl+78Zx9
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1