General
-
Target
21544030904b40c17843a625888dfc4d9b89d59ac3d82bad7c8bfa72926e9ffb.exe
-
Size
405KB
-
Sample
241115-3y8f7sypdk
-
MD5
4256c54157857c73048011a280185878
-
SHA1
ecec5f2b3411f7c2ec18fb69021136453e3375c3
-
SHA256
21544030904b40c17843a625888dfc4d9b89d59ac3d82bad7c8bfa72926e9ffb
-
SHA512
0c0410081b9a27362f6b3a36ff95aeffb4e48d8a34e393cff710931ce2a195b1a8126dd3581569b8917f1faa58af68545bb00887b2538dff728cab3d2a31e17c
-
SSDEEP
12288:pMrzy90hFQGckzHpDXxLJaH2SvI7k/pIQ:Gyku1kLnLKLI7k/GQ
Static task
static1
Behavioral task
behavioral1
Sample
21544030904b40c17843a625888dfc4d9b89d59ac3d82bad7c8bfa72926e9ffb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
21544030904b40c17843a625888dfc4d9b89d59ac3d82bad7c8bfa72926e9ffb.exe
-
Size
405KB
-
MD5
4256c54157857c73048011a280185878
-
SHA1
ecec5f2b3411f7c2ec18fb69021136453e3375c3
-
SHA256
21544030904b40c17843a625888dfc4d9b89d59ac3d82bad7c8bfa72926e9ffb
-
SHA512
0c0410081b9a27362f6b3a36ff95aeffb4e48d8a34e393cff710931ce2a195b1a8126dd3581569b8917f1faa58af68545bb00887b2538dff728cab3d2a31e17c
-
SSDEEP
12288:pMrzy90hFQGckzHpDXxLJaH2SvI7k/pIQ:Gyku1kLnLKLI7k/GQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1