General
-
Target
WX3.exe
-
Size
916KB
-
Sample
240126-x6nh4sebfq
-
MD5
9ac6079806fb87b0f396b7af773db257
-
SHA1
ef3ad6fe0aa54146701c57424d0efb6b62abdb6c
-
SHA256
cd6b42df418c54a291b058fd2900cc3d2519376461a9d1a11b108f3a389caab9
-
SHA512
3b68b75593d22bec2b12bde480ab7c434a9c47cdc90fc79a23a6744ba7027a376bbce9809b18e09e290627cee122952b8a57598ffcaf4bc38698a19eebc82a63
-
SSDEEP
12288:2Mrby906ebnGZA2B4FGP25i6A24wVkI3LFacF48DTwWYIierlXPsw1VUyz6WfbVF:tyS92B32Uu4wiAHxPxLnirC
Static task
static1
Behavioral task
behavioral1
Sample
WX3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
WX3.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
maxi
77.91.124.145:4125
-
auth_value
6e90da232d4c2e35c1a36c250f5f8904
Targets
-
-
Target
WX3.exe
-
Size
916KB
-
MD5
9ac6079806fb87b0f396b7af773db257
-
SHA1
ef3ad6fe0aa54146701c57424d0efb6b62abdb6c
-
SHA256
cd6b42df418c54a291b058fd2900cc3d2519376461a9d1a11b108f3a389caab9
-
SHA512
3b68b75593d22bec2b12bde480ab7c434a9c47cdc90fc79a23a6744ba7027a376bbce9809b18e09e290627cee122952b8a57598ffcaf4bc38698a19eebc82a63
-
SSDEEP
12288:2Mrby906ebnGZA2B4FGP25i6A24wVkI3LFacF48DTwWYIierlXPsw1VUyz6WfbVF:tyS92B32Uu4wiAHxPxLnirC
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1