General
-
Target
36aabb6865df116a72f72e9c08c6ea01544c2d83b852eff487fa3a7321108027
-
Size
883KB
-
Sample
241108-cbfvkasflj
-
MD5
b58ab286b15642433e6975857e042aa7
-
SHA1
0dfb95f5f4692937346c05bce896beaf8bf410ad
-
SHA256
36aabb6865df116a72f72e9c08c6ea01544c2d83b852eff487fa3a7321108027
-
SHA512
9e16683d80ddf477d5706831641cb7e48e512d6016436bfd968efe683f0ce52eb745a2c32ab635f71268d3298224594450f5b11bb174ff7222ddaff37606521c
-
SSDEEP
24576:zVeNHhj0lOzHO6zQBatiFtgbIxghQJ94rDJ228ZW:zVej0lObOrBatyE8WAurZ7
Static task
static1
Behavioral task
behavioral1
Sample
b181e8afd4822f75f69f62c09ee9194631a6669ca9283b575e855119316ba6c1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Targets
-
-
Target
b181e8afd4822f75f69f62c09ee9194631a6669ca9283b575e855119316ba6c1.exe
-
Size
927KB
-
MD5
d671a43cc433dbff920e45965f5810f4
-
SHA1
40180f91329335c841fd8d081e832e95af8ac826
-
SHA256
b181e8afd4822f75f69f62c09ee9194631a6669ca9283b575e855119316ba6c1
-
SHA512
41c8f2e1320435966201a0084b47b94cb9cf5b469c4a174aee0fa65f9a8708d427c27a3e9f2012be5071a87257e99f74624f113c2978e9855d1639bd5cdf1720
-
SSDEEP
12288:RMrry90NAWuTHqbZRztu/KbFv1d+bWlUFoWK4IkpixJMPATx4cSSkxu3+uORf/bz:Gya8SWeFNd+6lUbK4IVVASYymbuy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1