General
-
Target
b0780e66ef7f02a61f02fd0f82d571f7e7f56cb9f1a63a118557979f21a40055N.exe
-
Size
552KB
-
Sample
241117-f7nrts1qcy
-
MD5
0fffbee993a8d849a9b034c4268cede0
-
SHA1
31d0c47ccb3d896ab6ea5808b7c4464a46c1c2a6
-
SHA256
b0780e66ef7f02a61f02fd0f82d571f7e7f56cb9f1a63a118557979f21a40055
-
SHA512
6caaedac5df4d9527209bf7bcb21b4ae6435e4dba9adfdc78a2fa61a287e065f6d90744952f1baca4756984726024a51f21b8e55596737034c238ff3df8f03e2
-
SSDEEP
12288:zMrey90kVZy72+ztY+0wibcuC0LFtuFsez:xy26+ztY+obm0yFPz
Static task
static1
Behavioral task
behavioral1
Sample
b0780e66ef7f02a61f02fd0f82d571f7e7f56cb9f1a63a118557979f21a40055N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
b0780e66ef7f02a61f02fd0f82d571f7e7f56cb9f1a63a118557979f21a40055N.exe
-
Size
552KB
-
MD5
0fffbee993a8d849a9b034c4268cede0
-
SHA1
31d0c47ccb3d896ab6ea5808b7c4464a46c1c2a6
-
SHA256
b0780e66ef7f02a61f02fd0f82d571f7e7f56cb9f1a63a118557979f21a40055
-
SHA512
6caaedac5df4d9527209bf7bcb21b4ae6435e4dba9adfdc78a2fa61a287e065f6d90744952f1baca4756984726024a51f21b8e55596737034c238ff3df8f03e2
-
SSDEEP
12288:zMrey90kVZy72+ztY+0wibcuC0LFtuFsez:xy26+ztY+obm0yFPz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1