General
-
Target
baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927
-
Size
926KB
-
Sample
241110-qnls8sxenk
-
MD5
f3cf278ffa35c6e51b0e0456f262bd5d
-
SHA1
ba52d58108f1b9aad7b47a56401f0aff22455543
-
SHA256
baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927
-
SHA512
a952e86b9a51163bccab10d206e8d3ce3f269fc3694b1d0b4bc427bf801200a674070921934f7597f68cf9cb3000e3219898d4c77461d9e493f2c07976504442
-
SSDEEP
12288:WMrfy90NrpsDzbShf46qZUDAKmg7jNlPU9Xi4Izpi/Jg+HOb9Jjp1c47lmCnjdvQ:1yuCDz2OG/NlPyi4IYgjP1FvnJv//el
Static task
static1
Behavioral task
behavioral1
Sample
baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Targets
-
-
Target
baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927
-
Size
926KB
-
MD5
f3cf278ffa35c6e51b0e0456f262bd5d
-
SHA1
ba52d58108f1b9aad7b47a56401f0aff22455543
-
SHA256
baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927
-
SHA512
a952e86b9a51163bccab10d206e8d3ce3f269fc3694b1d0b4bc427bf801200a674070921934f7597f68cf9cb3000e3219898d4c77461d9e493f2c07976504442
-
SSDEEP
12288:WMrfy90NrpsDzbShf46qZUDAKmg7jNlPU9Xi4Izpi/Jg+HOb9Jjp1c47lmCnjdvQ:1yuCDz2OG/NlPyi4IYgjP1FvnJv//el
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1