General
-
Target
b9b8a89f4dd37933d92997776700af63e69f98e7ceec8d3aeaff2b9faa17131a
-
Size
882KB
-
Sample
241110-v9cjxavldl
-
MD5
626a335f26ce8c3dbdff53729d66be80
-
SHA1
38efe98ea752c31d13a013a5db341ff21aea1cad
-
SHA256
b9b8a89f4dd37933d92997776700af63e69f98e7ceec8d3aeaff2b9faa17131a
-
SHA512
aec6bf4e7cc606c679561d5a21fe2ccbb5e48abb5be2f19bdc3ab51a30496586fc95e61bbddbe80771d4f83bee1f946b8cef9f7ba326497172927c1089e9edd5
-
SSDEEP
24576:gxCl93B0LrC+atM6gdBFAyHBAcDsllZBuENgXix591:Rl93qrHaGdX3BAcAllNx591
Static task
static1
Behavioral task
behavioral1
Sample
c4949a2ecd1142962ea1071013e97163e40ea61aa238809276ac598e3ba60c0f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Targets
-
-
Target
c4949a2ecd1142962ea1071013e97163e40ea61aa238809276ac598e3ba60c0f.exe
-
Size
925KB
-
MD5
0584afd1bd15a6aa373f18e2c76dad11
-
SHA1
4adb48b2008c43b92c17c9ddca9ba678b44fc090
-
SHA256
c4949a2ecd1142962ea1071013e97163e40ea61aa238809276ac598e3ba60c0f
-
SHA512
765ae9acba6b3f21c2e734aebcb53a5dbcc04ab06e7394b9a9ec8ade87fa49c50bbdfc94fb38c842c09fa0a6bd2964e360e4ef370eecb72be3ce2a867a96bcb2
-
SSDEEP
24576:EyQCKkHswbMppNoJmLAHuScZ2Wxt3G8ktifLwy+G:TRKkMtqyAOScZJt3G8yicV
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1