General
-
Target
29d9f8d91a952af86673672f77edafc81e15840ef0535b94ce21ba7e733ccd83N.exe
-
Size
646KB
-
Sample
241113-jz1yzayblq
-
MD5
76cc9f51fb5c0a3fbc9ecbed147d8eb0
-
SHA1
d8db3988c478b61309da2cbf6dacda1cb09893a0
-
SHA256
29d9f8d91a952af86673672f77edafc81e15840ef0535b94ce21ba7e733ccd83
-
SHA512
d3c1eb231dbb93c8a233348dc482ecb5d0799e20cf25c5b286b8b15c979c8cba97a923dbb85f534b7d379556ea64aab2cc62ab73dc616afb89f6f16e4e619044
-
SSDEEP
12288:WMray901szsHBCoo0lCg2mhzfZrfIeIHVP9DhkHxJfdv1Nquy:My+JCooGCg2grRuHVPPk7fd+uy
Static task
static1
Behavioral task
behavioral1
Sample
29d9f8d91a952af86673672f77edafc81e15840ef0535b94ce21ba7e733ccd83N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
29d9f8d91a952af86673672f77edafc81e15840ef0535b94ce21ba7e733ccd83N.exe
-
Size
646KB
-
MD5
76cc9f51fb5c0a3fbc9ecbed147d8eb0
-
SHA1
d8db3988c478b61309da2cbf6dacda1cb09893a0
-
SHA256
29d9f8d91a952af86673672f77edafc81e15840ef0535b94ce21ba7e733ccd83
-
SHA512
d3c1eb231dbb93c8a233348dc482ecb5d0799e20cf25c5b286b8b15c979c8cba97a923dbb85f534b7d379556ea64aab2cc62ab73dc616afb89f6f16e4e619044
-
SSDEEP
12288:WMray901szsHBCoo0lCg2mhzfZrfIeIHVP9DhkHxJfdv1Nquy:My+JCooGCg2grRuHVPPk7fd+uy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1