General
-
Target
2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe
-
Size
787KB
-
Sample
241113-smqf5sthle
-
MD5
33d0e701e05d789f2f9c196f70aba06d
-
SHA1
a28185e77ad8b5a859c2e5b6fd1df79fb1e49bd3
-
SHA256
2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570
-
SHA512
18c9a361bbaabf85f649203b300760daa1c3f830811f251dff6a2c6d71677f54aa91e31af95728536f2149778b0bef7cd2fd88d50d2a4eb53a74f53993871b8b
-
SSDEEP
24576:NyzSMEvTgvipuOJWFr1NOXSOP/YIQqUl0aeT:o3oduOUZNOCyYIlUvA
Static task
static1
Behavioral task
behavioral1
Sample
2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe
-
Size
787KB
-
MD5
33d0e701e05d789f2f9c196f70aba06d
-
SHA1
a28185e77ad8b5a859c2e5b6fd1df79fb1e49bd3
-
SHA256
2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570
-
SHA512
18c9a361bbaabf85f649203b300760daa1c3f830811f251dff6a2c6d71677f54aa91e31af95728536f2149778b0bef7cd2fd88d50d2a4eb53a74f53993871b8b
-
SSDEEP
24576:NyzSMEvTgvipuOJWFr1NOXSOP/YIQqUl0aeT:o3oduOUZNOCyYIlUvA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1