General
-
Target
066d805580d40ee12d8d6ad085808449ba1812dba48977d9c0f2ef0671433488N.exe
-
Size
402KB
-
Sample
241113-gjg5tazmgp
-
MD5
e04859d5fea04d1179ac843f5d5930c0
-
SHA1
c2c0c5778b8cf8c42bb785a551d931b69b46fdca
-
SHA256
066d805580d40ee12d8d6ad085808449ba1812dba48977d9c0f2ef0671433488
-
SHA512
b10d197a5a67c55a6f62f43fbd5931e71387b5dcb42547be0522bb28b40b23a6c39c947b58e00b1f330127eb277c727993bf8a50ee1bfe9c8d2a89629640e379
-
SSDEEP
6144:K+y+bnr+Tp0yN90QECXz/sZAjG77XYef78JidT2CWmSUDk6S3QZaqOyQ2BQ53:WMrvy90AlG77YegJidaaIMaqxQ2BU
Static task
static1
Behavioral task
behavioral1
Sample
066d805580d40ee12d8d6ad085808449ba1812dba48977d9c0f2ef0671433488N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
066d805580d40ee12d8d6ad085808449ba1812dba48977d9c0f2ef0671433488N.exe
-
Size
402KB
-
MD5
e04859d5fea04d1179ac843f5d5930c0
-
SHA1
c2c0c5778b8cf8c42bb785a551d931b69b46fdca
-
SHA256
066d805580d40ee12d8d6ad085808449ba1812dba48977d9c0f2ef0671433488
-
SHA512
b10d197a5a67c55a6f62f43fbd5931e71387b5dcb42547be0522bb28b40b23a6c39c947b58e00b1f330127eb277c727993bf8a50ee1bfe9c8d2a89629640e379
-
SSDEEP
6144:K+y+bnr+Tp0yN90QECXz/sZAjG77XYef78JidT2CWmSUDk6S3QZaqOyQ2BQ53:WMrvy90AlG77YegJidaaIMaqxQ2BU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1