General
-
Target
58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146
-
Size
814KB
-
Sample
241107-m76e7szqet
-
MD5
d4d6d198f6009c1719f85f40ae2ae5db
-
SHA1
071e1ae0ef8a6c82b99cebafa29afaaeb631bf73
-
SHA256
58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146
-
SHA512
b24aa72f1d82d8e8886d205589cc1e9602563f878dbe6a5836660b3522f22c208e6045361da8dd38c2d85b10fffcdb58add74a5c4df0f6e05abd21e35aebf699
-
SSDEEP
12288:PMr4y90fv1sbZQtKQ8clh9+NC2WUzxLK7GaYxNyfaJLX+3uMHxbXiLO1xtiJX4yo:LyWv1sbKph9Y9H5K7GrLyukFbDwJXJo
Static task
static1
Behavioral task
behavioral1
Sample
58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Targets
-
-
Target
58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146
-
Size
814KB
-
MD5
d4d6d198f6009c1719f85f40ae2ae5db
-
SHA1
071e1ae0ef8a6c82b99cebafa29afaaeb631bf73
-
SHA256
58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146
-
SHA512
b24aa72f1d82d8e8886d205589cc1e9602563f878dbe6a5836660b3522f22c208e6045361da8dd38c2d85b10fffcdb58add74a5c4df0f6e05abd21e35aebf699
-
SSDEEP
12288:PMr4y90fv1sbZQtKQ8clh9+NC2WUzxLK7GaYxNyfaJLX+3uMHxbXiLO1xtiJX4yo:LyWv1sbKph9Y9H5K7GrLyukFbDwJXJo
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1