General
-
Target
17a78a2a7d4082872b4dba4e914eca79e7b57f01594a46fae92c3f0ff434f76f.exe
-
Size
953KB
-
Sample
241125-28qtga1ph1
-
MD5
fffc879b5df651e03bbf3023de71793b
-
SHA1
f6d10dcbe271536c388c5f0d2002aa399a2af708
-
SHA256
17a78a2a7d4082872b4dba4e914eca79e7b57f01594a46fae92c3f0ff434f76f
-
SHA512
7ee34224c2cb4ed863d700be162c76b12ff68e17acbdeb0b2657509a2168b2dba471e8bcade7999047310ef117971962ce4d92ceb3f0c966f3bc79d1113fc124
-
SSDEEP
12288:qRCy90ortpkMjEzVCn7452AsFfIF22Yoi1ul8boksUyO+nQFK1OZMBSHjEVxXLdo:lytk5UnQsFk2SiOQokqQ7ZMOSx7dBwXN
Static task
static1
Behavioral task
behavioral1
Sample
17a78a2a7d4082872b4dba4e914eca79e7b57f01594a46fae92c3f0ff434f76f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
17a78a2a7d4082872b4dba4e914eca79e7b57f01594a46fae92c3f0ff434f76f.exe
-
Size
953KB
-
MD5
fffc879b5df651e03bbf3023de71793b
-
SHA1
f6d10dcbe271536c388c5f0d2002aa399a2af708
-
SHA256
17a78a2a7d4082872b4dba4e914eca79e7b57f01594a46fae92c3f0ff434f76f
-
SHA512
7ee34224c2cb4ed863d700be162c76b12ff68e17acbdeb0b2657509a2168b2dba471e8bcade7999047310ef117971962ce4d92ceb3f0c966f3bc79d1113fc124
-
SSDEEP
12288:qRCy90ortpkMjEzVCn7452AsFfIF22Yoi1ul8boksUyO+nQFK1OZMBSHjEVxXLdo:lytk5UnQsFk2SiOQokqQ7ZMOSx7dBwXN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1