General
-
Target
017671dcac1cac669ed6f943cbc3b2ee147bb045c047e703fbfbfef298f01b13
-
Size
651KB
-
Sample
241105-pmzg9ssakr
-
MD5
a8530fd087d5a258751fb49f2deaaf4e
-
SHA1
646eb43c1555db33d48adf67b52054b90518e40e
-
SHA256
017671dcac1cac669ed6f943cbc3b2ee147bb045c047e703fbfbfef298f01b13
-
SHA512
80756f1f073a758addd0299a7f12729feed2430265e274e4db59cde4bc038be7c1abd4e1995a70b95a2d662c0e9f995a2decb10b307e0156e30e0d62d67fae35
-
SSDEEP
12288:IMr7y90d+REC0v7TenRWJptEmbQZO83npgGtqGr8Xf5vr:jyrRzM7TKcJrEp6GBif5j
Static task
static1
Behavioral task
behavioral1
Sample
017671dcac1cac669ed6f943cbc3b2ee147bb045c047e703fbfbfef298f01b13.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Targets
-
-
Target
017671dcac1cac669ed6f943cbc3b2ee147bb045c047e703fbfbfef298f01b13
-
Size
651KB
-
MD5
a8530fd087d5a258751fb49f2deaaf4e
-
SHA1
646eb43c1555db33d48adf67b52054b90518e40e
-
SHA256
017671dcac1cac669ed6f943cbc3b2ee147bb045c047e703fbfbfef298f01b13
-
SHA512
80756f1f073a758addd0299a7f12729feed2430265e274e4db59cde4bc038be7c1abd4e1995a70b95a2d662c0e9f995a2decb10b307e0156e30e0d62d67fae35
-
SSDEEP
12288:IMr7y90d+REC0v7TenRWJptEmbQZO83npgGtqGr8Xf5vr:jyrRzM7TKcJrEp6GBif5j
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1