General
-
Target
a801e2c25aa7358c0f28fecafcda83aeef26e71745c36a6ad48a272bdf9256e5N.exe
-
Size
569KB
-
Sample
241112-pjvpxa1pfs
-
MD5
c8a2054f3587e42e4965b2f6abeb7b62
-
SHA1
3c634b4d15b671b0a47382c38e9040fa28cc31e5
-
SHA256
4689adccecb681b628a1f9e3c4df344820d384ef4b8fe4165fac3830285a6a98
-
SHA512
efc2f246320fa8d8739da42f65d98e923644d261144acf10f2190ebea5e9115e80e4d843352a7d6ac4b532b1a400bc9dc8104536183de64917acf54dd863e4fe
-
SSDEEP
12288:FMrWy906ahimz7AuxqVlzCx3wjnQy8JYYBL0PUWQ:zyPsVAuxYpCx38n78+WAPrQ
Static task
static1
Behavioral task
behavioral1
Sample
a801e2c25aa7358c0f28fecafcda83aeef26e71745c36a6ad48a272bdf9256e5N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
a801e2c25aa7358c0f28fecafcda83aeef26e71745c36a6ad48a272bdf9256e5N.exe
-
Size
569KB
-
MD5
c8a2054f3587e42e4965b2f6abeb7b62
-
SHA1
3c634b4d15b671b0a47382c38e9040fa28cc31e5
-
SHA256
4689adccecb681b628a1f9e3c4df344820d384ef4b8fe4165fac3830285a6a98
-
SHA512
efc2f246320fa8d8739da42f65d98e923644d261144acf10f2190ebea5e9115e80e4d843352a7d6ac4b532b1a400bc9dc8104536183de64917acf54dd863e4fe
-
SSDEEP
12288:FMrWy906ahimz7AuxqVlzCx3wjnQy8JYYBL0PUWQ:zyPsVAuxYpCx38n78+WAPrQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1