General
-
Target
a2462485ad895b555267a5ed6c7d26697c07cafab22206f9ea0271bed53ee409
-
Size
1.0MB
-
Sample
241107-qgs9qssgpa
-
MD5
f5c22b45731a3891aa0941aa044449ca
-
SHA1
e9da37b17e6d035abc699870aff821816b0ca5cd
-
SHA256
a2462485ad895b555267a5ed6c7d26697c07cafab22206f9ea0271bed53ee409
-
SHA512
e44a65bf4e4ba6237edab3e0f1d07e8c7a68adc4fb5530241d68ced5497372f1bc60514ac91cdbef95be890f180d326bbc17b0ce2ca2dd758e3c2dd8031bfc24
-
SSDEEP
24576:SyXQFQolwk1OLDqrvilIFDpISRNVJq6h7I3AfJ+fK:5XQiC1OLEiwDyEPY6F8A
Static task
static1
Behavioral task
behavioral1
Sample
a2462485ad895b555267a5ed6c7d26697c07cafab22206f9ea0271bed53ee409.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Targets
-
-
Target
a2462485ad895b555267a5ed6c7d26697c07cafab22206f9ea0271bed53ee409
-
Size
1.0MB
-
MD5
f5c22b45731a3891aa0941aa044449ca
-
SHA1
e9da37b17e6d035abc699870aff821816b0ca5cd
-
SHA256
a2462485ad895b555267a5ed6c7d26697c07cafab22206f9ea0271bed53ee409
-
SHA512
e44a65bf4e4ba6237edab3e0f1d07e8c7a68adc4fb5530241d68ced5497372f1bc60514ac91cdbef95be890f180d326bbc17b0ce2ca2dd758e3c2dd8031bfc24
-
SSDEEP
24576:SyXQFQolwk1OLDqrvilIFDpISRNVJq6h7I3AfJ+fK:5XQiC1OLEiwDyEPY6F8A
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1