General
-
Target
6848d6e392011e4c79479291dcb6e4a83e565f2115b06a9c75b87b6d6f7fc337N.exe
-
Size
644KB
-
Sample
241112-s4q41avkby
-
MD5
6f533bb30c54f34b6f69eaeb2c0322d0
-
SHA1
1db9207a1ca390e70040adfb83c05d48b1e10b93
-
SHA256
6848d6e392011e4c79479291dcb6e4a83e565f2115b06a9c75b87b6d6f7fc337
-
SHA512
77300250b94a868f4c1c08cb0bf5a09a69228e056c6706f8d6e908f9c284c856685a15cbc017563b70d28753a71afd7cb6fea733b24f83716e696c44f9e59995
-
SSDEEP
12288:SMrBy90NNQnu+qHggW6Wl6ESPamUK/ZUpdvlLOgUTMEEO4:ry1nufTWO6mUK/ZmLOdEO4
Static task
static1
Behavioral task
behavioral1
Sample
6848d6e392011e4c79479291dcb6e4a83e565f2115b06a9c75b87b6d6f7fc337N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
6848d6e392011e4c79479291dcb6e4a83e565f2115b06a9c75b87b6d6f7fc337N.exe
-
Size
644KB
-
MD5
6f533bb30c54f34b6f69eaeb2c0322d0
-
SHA1
1db9207a1ca390e70040adfb83c05d48b1e10b93
-
SHA256
6848d6e392011e4c79479291dcb6e4a83e565f2115b06a9c75b87b6d6f7fc337
-
SHA512
77300250b94a868f4c1c08cb0bf5a09a69228e056c6706f8d6e908f9c284c856685a15cbc017563b70d28753a71afd7cb6fea733b24f83716e696c44f9e59995
-
SSDEEP
12288:SMrBy90NNQnu+qHggW6Wl6ESPamUK/ZUpdvlLOgUTMEEO4:ry1nufTWO6mUK/ZmLOdEO4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1