General
-
Target
RedLine.zip
-
Size
598KB
-
Sample
241129-ttgcgszkbq
-
MD5
64cfa3d0bdd3148d63eb7f2dc1f65c7f
-
SHA1
8ca03552394d7e92b3364804d5a6039ff64fed6e
-
SHA256
4511dc4b5391f31b40e9d4c6b3988e11daabc2e52b2006106ab086821ef612d2
-
SHA512
169d6e869562656f370cfb2e12e37bd3cd88d9c19e897d955f3d6469e08d0a6419b3c3aa44e7522e02b5bdb33224069bd2bd3773472fbc7f9f39c931f66acb15
-
SSDEEP
12288:pRE7irVkyDOy4TNChDrYBT97RXAYfNY5OdV9lESFcg6TZ3BfKTPgX:TE2rVkyDOy4TNChDrm9NFYWLlVGlBfKe
Static task
static1
Behavioral task
behavioral1
Sample
8510d7a17e5b336a240d7f8c5fb3f8c634362540ff216dec0d0150332d7e2d6e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
8510d7a17e5b336a240d7f8c5fb3f8c634362540ff216dec0d0150332d7e2d6e
-
Size
648KB
-
MD5
be78e478192da4c3e4f52d2dc924a404
-
SHA1
7ff610a8c5990cf49da2d64a77b1a175fb56feac
-
SHA256
8510d7a17e5b336a240d7f8c5fb3f8c634362540ff216dec0d0150332d7e2d6e
-
SHA512
fad110dd9c3a2ffa4323fd3374ecb2293b321df40313f8530e9edf8536c13814bd26d0c1eb344b145e6b5c29a3755b663f4e128d9b15594793847ee557fffdc1
-
SSDEEP
12288:eMruy90/ovVrP7UHDam6CNJqGXLovydvlCHZzHSG4eEF4D:IyJVbwHxT4GblvlcZzFI6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1