General
-
Target
7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe
-
Size
642KB
-
Sample
241114-faegwsyjhj
-
MD5
bba2173d1b9fe17bee7e0a77c6c9ba22
-
SHA1
3e15755d793ee5eadc351246959c5615c2cb9c0f
-
SHA256
7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4
-
SHA512
b50a2773ddc887ca58ae7ed5cb09c1531cc68d140c183184b829b9ce666589263c1f3750f76b480698637ae44530c5b6edb4dee71f68f27c971076a9437ab94d
-
SSDEEP
12288:KMrsy9030yAhzS7CVO9uka5lKy31yRf2jdO3GwdkRBK1HZdrQk13wseUtcXJzw:GyXy4S7uOYARRf2jYToE15Z+hw
Static task
static1
Behavioral task
behavioral1
Sample
7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe
-
Size
642KB
-
MD5
bba2173d1b9fe17bee7e0a77c6c9ba22
-
SHA1
3e15755d793ee5eadc351246959c5615c2cb9c0f
-
SHA256
7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4
-
SHA512
b50a2773ddc887ca58ae7ed5cb09c1531cc68d140c183184b829b9ce666589263c1f3750f76b480698637ae44530c5b6edb4dee71f68f27c971076a9437ab94d
-
SSDEEP
12288:KMrsy9030yAhzS7CVO9uka5lKy31yRf2jdO3GwdkRBK1HZdrQk13wseUtcXJzw:GyXy4S7uOYARRf2jYToE15Z+hw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1