General
-
Target
2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe
-
Size
793KB
-
Sample
241114-lmc3gsxbmf
-
MD5
4e9b3c2b74d2aa74ed163b141852477b
-
SHA1
9bcba2e5bbb15331a7c89c1634a7d4fd4f35f8a4
-
SHA256
2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a
-
SHA512
9b9be51a4c0a6b6e85f1b4cb2fa406519edc1f21db41dc397712dc599eac7bb1e8b5c87b651688bef41a5e5c526e861f0f935fb6ac0f45033a6f82e9a003e1f5
-
SSDEEP
12288:qMrNy90s+ly3RGMTl2YAV3KguyyQeiRga/T2YvigpZ2pMRTVPuyEdjZDCwol:zyT+ABBT4du/QePl/fp29EdjZJol
Static task
static1
Behavioral task
behavioral1
Sample
2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe
-
Size
793KB
-
MD5
4e9b3c2b74d2aa74ed163b141852477b
-
SHA1
9bcba2e5bbb15331a7c89c1634a7d4fd4f35f8a4
-
SHA256
2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a
-
SHA512
9b9be51a4c0a6b6e85f1b4cb2fa406519edc1f21db41dc397712dc599eac7bb1e8b5c87b651688bef41a5e5c526e861f0f935fb6ac0f45033a6f82e9a003e1f5
-
SSDEEP
12288:qMrNy90s+ly3RGMTl2YAV3KguyyQeiRga/T2YvigpZ2pMRTVPuyEdjZDCwol:zyT+ABBT4du/QePl/fp29EdjZJol
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1