General
-
Target
9da133b4e10218cb62fc3dc19a9e12247109807cc387ef2313d13a0656d26741
-
Size
662KB
-
Sample
241109-dxth8awgkr
-
MD5
2b03710bcf62aa9b8d1f5e2eb1424200
-
SHA1
6fd3b4d0bf77b65f131bb310a0a0091c3dc1d38a
-
SHA256
9da133b4e10218cb62fc3dc19a9e12247109807cc387ef2313d13a0656d26741
-
SHA512
9a657b90d34fb872cd25581cae4eb3d0da9b2307ebb04072c76448e15c5d84578af7526a8508bbeddebac930a974c732ace042b923986c6a3eade0a86a728241
-
SSDEEP
12288:GMrQy903RbsDgZdLNADzThwWURqA8/MPsecTNm7ZCfyqbpTAggRSTFS5Go9:6yA5mwEzThlURqBOPdsyl0TFM
Static task
static1
Behavioral task
behavioral1
Sample
9da133b4e10218cb62fc3dc19a9e12247109807cc387ef2313d13a0656d26741.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Targets
-
-
Target
9da133b4e10218cb62fc3dc19a9e12247109807cc387ef2313d13a0656d26741
-
Size
662KB
-
MD5
2b03710bcf62aa9b8d1f5e2eb1424200
-
SHA1
6fd3b4d0bf77b65f131bb310a0a0091c3dc1d38a
-
SHA256
9da133b4e10218cb62fc3dc19a9e12247109807cc387ef2313d13a0656d26741
-
SHA512
9a657b90d34fb872cd25581cae4eb3d0da9b2307ebb04072c76448e15c5d84578af7526a8508bbeddebac930a974c732ace042b923986c6a3eade0a86a728241
-
SSDEEP
12288:GMrQy903RbsDgZdLNADzThwWURqA8/MPsecTNm7ZCfyqbpTAggRSTFS5Go9:6yA5mwEzThlURqBOPdsyl0TFM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1