General
-
Target
822cb7b6fc534626018354dc2f11707c6c5f80dc886a5969a8071a8c2d0259b9
-
Size
1019KB
-
Sample
241109-ngs8matcmn
-
MD5
f720c892930320ab4b03302e107b7ff1
-
SHA1
00f339c55660d51a8aac5149e692b30e8d9a41af
-
SHA256
822cb7b6fc534626018354dc2f11707c6c5f80dc886a5969a8071a8c2d0259b9
-
SHA512
668afaadcfb6307bc46700b8692fa9b969dc83c1bad3c5960373bda7aa6dd35f4570c8ba2f742ef35e60e3a63bed98e6308dd6a3b6f176a54e63298cfd5b8c97
-
SSDEEP
24576:lp7vNmfuCXulhdgRnfyvst/MOWCoKFlIjDuusOj:to5XKgRqvs+CoU6Lj
Static task
static1
Behavioral task
behavioral1
Sample
234e9e282e7f2ad1cbbc5ffc2aa67267eb2d5eaf34542df1f7f891fab36aedfb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Targets
-
-
Target
234e9e282e7f2ad1cbbc5ffc2aa67267eb2d5eaf34542df1f7f891fab36aedfb.exe
-
Size
1.0MB
-
MD5
f6e3aa012f0f42e0504ba0c5699eb95b
-
SHA1
c388ba51516a7ada32a035997a30ca2b0e64a453
-
SHA256
234e9e282e7f2ad1cbbc5ffc2aa67267eb2d5eaf34542df1f7f891fab36aedfb
-
SHA512
44c3e644262c94521ddc4f72e6922ea4d3e890c88d8aa5870a100a4f528450ce53db40b7a8ea446dea6a23900bd9b337d85112ab3ab8557910958a332fd58ba3
-
SSDEEP
24576:HySYMy815XptL4iO/T4cjJ0gcXHEmfgLZwbr+A4KlLd1:SNwZptL4ZFj2gc0Pwm1E
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1