General
-
Target
1574c65a641ddf2e3d4350f1e44109f86e816537ce47c9fa91c6c5940fbe6d8b.exe
-
Size
643KB
-
Sample
241115-vb3y7sxgke
-
MD5
818215c7be61c2ac0fc9692fb811ea60
-
SHA1
fbb127fcfb59f4f92b9004edc01cfbd328212bff
-
SHA256
1574c65a641ddf2e3d4350f1e44109f86e816537ce47c9fa91c6c5940fbe6d8b
-
SHA512
f5f5d317dce4474e6ab3c23b83ad0eec3e0c9169e624db778967c8dfcc9b07f3948094294835e0e3fd09425a15e254710e83b57d54027f878d46b0985cab19ff
-
SSDEEP
12288:9MrHy90tCYRuhgr/ERrRhSCnFGv67am7AObPuCVbX9JaeRP2Y/EppY9D:CycCPhgTEkmFGpMb3hUel2+9D
Static task
static1
Behavioral task
behavioral1
Sample
1574c65a641ddf2e3d4350f1e44109f86e816537ce47c9fa91c6c5940fbe6d8b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
1574c65a641ddf2e3d4350f1e44109f86e816537ce47c9fa91c6c5940fbe6d8b.exe
-
Size
643KB
-
MD5
818215c7be61c2ac0fc9692fb811ea60
-
SHA1
fbb127fcfb59f4f92b9004edc01cfbd328212bff
-
SHA256
1574c65a641ddf2e3d4350f1e44109f86e816537ce47c9fa91c6c5940fbe6d8b
-
SHA512
f5f5d317dce4474e6ab3c23b83ad0eec3e0c9169e624db778967c8dfcc9b07f3948094294835e0e3fd09425a15e254710e83b57d54027f878d46b0985cab19ff
-
SSDEEP
12288:9MrHy90tCYRuhgr/ERrRhSCnFGv67am7AObPuCVbX9JaeRP2Y/EppY9D:CycCPhgTEkmFGpMb3hUel2+9D
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1