General
-
Target
f90897c01fe596f0d96cb1f051f5d9f74c6aff43fab5026235182220321054d4
-
Size
661KB
-
Sample
241110-vd3ffs1bpr
-
MD5
db181de662c1572d09ba5cd70aecdf35
-
SHA1
77a7304f77ad986c6ab3d22f0697cea210205255
-
SHA256
f90897c01fe596f0d96cb1f051f5d9f74c6aff43fab5026235182220321054d4
-
SHA512
26b08956b05d679a602b9a34aebda2452d9657d2b51fea7f5967b90754bbe608298651e30d2fd343a1f855618975b9df47330b7fbbef1b92ba3e15c0a634ffdb
-
SSDEEP
12288:5Mrcy90gAxTVDprqsmpttWZYOHMvt/lkuLCM4I+pi5J5DAmHXh:NyhAxT3rj4ttKYZ/lk1M4IfimHx
Static task
static1
Behavioral task
behavioral1
Sample
f90897c01fe596f0d96cb1f051f5d9f74c6aff43fab5026235182220321054d4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Targets
-
-
Target
f90897c01fe596f0d96cb1f051f5d9f74c6aff43fab5026235182220321054d4
-
Size
661KB
-
MD5
db181de662c1572d09ba5cd70aecdf35
-
SHA1
77a7304f77ad986c6ab3d22f0697cea210205255
-
SHA256
f90897c01fe596f0d96cb1f051f5d9f74c6aff43fab5026235182220321054d4
-
SHA512
26b08956b05d679a602b9a34aebda2452d9657d2b51fea7f5967b90754bbe608298651e30d2fd343a1f855618975b9df47330b7fbbef1b92ba3e15c0a634ffdb
-
SSDEEP
12288:5Mrcy90gAxTVDprqsmpttWZYOHMvt/lkuLCM4I+pi5J5DAmHXh:NyhAxT3rj4ttKYZ/lk1M4IfimHx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1