General
-
Target
aade7371c756a35b6254fed02754968b9e645b278d467b94708223e88d8ebe61
-
Size
652KB
-
Sample
241107-sjx2taxjhj
-
MD5
0918435f20b4382e4211ea0501f8b47e
-
SHA1
df0e815bdbbb76901ea5c2629c8c6934a8837c84
-
SHA256
aade7371c756a35b6254fed02754968b9e645b278d467b94708223e88d8ebe61
-
SHA512
bab67081cc3198d85fe08e1ac67394085cfbb37637c12d7fb612805670902bdfd666bd1471ff59ccf4bd2f8cc38e200b602a3289c4b4a479f7dffcfe49fa0f11
-
SSDEEP
12288:vMrhy90G2jGxRmP2BeqNoPTRhUi3rT9PsGKV3tcb1S8O+Q6x:yyKqxsP2BtyjP5ycU+jx
Static task
static1
Behavioral task
behavioral1
Sample
aade7371c756a35b6254fed02754968b9e645b278d467b94708223e88d8ebe61.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Targets
-
-
Target
aade7371c756a35b6254fed02754968b9e645b278d467b94708223e88d8ebe61
-
Size
652KB
-
MD5
0918435f20b4382e4211ea0501f8b47e
-
SHA1
df0e815bdbbb76901ea5c2629c8c6934a8837c84
-
SHA256
aade7371c756a35b6254fed02754968b9e645b278d467b94708223e88d8ebe61
-
SHA512
bab67081cc3198d85fe08e1ac67394085cfbb37637c12d7fb612805670902bdfd666bd1471ff59ccf4bd2f8cc38e200b602a3289c4b4a479f7dffcfe49fa0f11
-
SSDEEP
12288:vMrhy90G2jGxRmP2BeqNoPTRhUi3rT9PsGKV3tcb1S8O+Q6x:yyKqxsP2BtyjP5ycU+jx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1