General
-
Target
15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023
-
Size
661KB
-
Sample
241107-dtekwswqgj
-
MD5
84be63ae36c7a4638f5163538c418d2f
-
SHA1
9ab586c337a0e350931d31a4c2811d9128652abd
-
SHA256
15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023
-
SHA512
c933f498bc3280c80d1a34a16e8dc92c18298339aa6f5d1f435fef178ea290cf509e29a1c3e9e1434b2d06424c5f062bf2c5070a6b541018fa16b440b5565d8d
-
SSDEEP
12288:2MrXy90JKfPyz7dmDfgPni2gLv3pjZcjBfnXyddYzPv0Szcs3phUNEAv9hVNy:VySKfqz7iIPXiZjZcjBCeDv0ELjbAv94
Static task
static1
Behavioral task
behavioral1
Sample
15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Targets
-
-
Target
15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023
-
Size
661KB
-
MD5
84be63ae36c7a4638f5163538c418d2f
-
SHA1
9ab586c337a0e350931d31a4c2811d9128652abd
-
SHA256
15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023
-
SHA512
c933f498bc3280c80d1a34a16e8dc92c18298339aa6f5d1f435fef178ea290cf509e29a1c3e9e1434b2d06424c5f062bf2c5070a6b541018fa16b440b5565d8d
-
SSDEEP
12288:2MrXy90JKfPyz7dmDfgPni2gLv3pjZcjBfnXyddYzPv0Szcs3phUNEAv9hVNy:VySKfqz7iIPXiZjZcjBCeDv0ELjbAv94
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1