General
-
Target
7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a
-
Size
650KB
-
Sample
241106-kzqnnsxgrp
-
MD5
48d39fcb8437f51a593b494930c17b45
-
SHA1
ef57f4886eba439508e203b5a7878343349a493a
-
SHA256
7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a
-
SHA512
77c5b6613e4e2ec03d988ece983350f94898891771bb4498a76487aeb63af19011a7ec8072aa0009e9fb8f38e66bebe8fdbf2a34570cd019c408c52c2514ebd1
-
SSDEEP
12288:VMrty90h7UOYf8sLXMG1zau3rU/TGEGulXL4BIM/:MyUNYftYG1Ou3rG0uFL4WM/
Static task
static1
Behavioral task
behavioral1
Sample
7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Targets
-
-
Target
7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a
-
Size
650KB
-
MD5
48d39fcb8437f51a593b494930c17b45
-
SHA1
ef57f4886eba439508e203b5a7878343349a493a
-
SHA256
7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a
-
SHA512
77c5b6613e4e2ec03d988ece983350f94898891771bb4498a76487aeb63af19011a7ec8072aa0009e9fb8f38e66bebe8fdbf2a34570cd019c408c52c2514ebd1
-
SSDEEP
12288:VMrty90h7UOYf8sLXMG1zau3rU/TGEGulXL4BIM/:MyUNYftYG1Ou3rG0uFL4WM/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1