General
-
Target
eef273f9d905deedaea67f73776269d7a84c7d49373e6497692a9f157d395dec.exe
-
Size
536KB
-
Sample
241113-x1cjnaxkgy
-
MD5
f9e7b3d6436bc66aaf6d235a2c3cd576
-
SHA1
5c06ca701cfbc498f669e88c3f7722c44d262774
-
SHA256
eef273f9d905deedaea67f73776269d7a84c7d49373e6497692a9f157d395dec
-
SHA512
ec7e6d02189aa9c488426dcad6cefdd3a5faf194a3f00199aabf578d315105277a733affda14c27e7b35d007a13299294b53d281af744f3e5f719312e4571b33
-
SSDEEP
12288:kMrPy90xHBeAou0FWpKaJtx/uYXqJEn7y0nuZq:LyWH1QaJv/umqG4q
Static task
static1
Behavioral task
behavioral1
Sample
eef273f9d905deedaea67f73776269d7a84c7d49373e6497692a9f157d395dec.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
eef273f9d905deedaea67f73776269d7a84c7d49373e6497692a9f157d395dec.exe
-
Size
536KB
-
MD5
f9e7b3d6436bc66aaf6d235a2c3cd576
-
SHA1
5c06ca701cfbc498f669e88c3f7722c44d262774
-
SHA256
eef273f9d905deedaea67f73776269d7a84c7d49373e6497692a9f157d395dec
-
SHA512
ec7e6d02189aa9c488426dcad6cefdd3a5faf194a3f00199aabf578d315105277a733affda14c27e7b35d007a13299294b53d281af744f3e5f719312e4571b33
-
SSDEEP
12288:kMrPy90xHBeAou0FWpKaJtx/uYXqJEn7y0nuZq:LyWH1QaJv/umqG4q
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1