General
-
Target
94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc
-
Size
661KB
-
Sample
241110-yhplyatdpk
-
MD5
b2f4d0b5b5e1090d39a37d8efd7c0eb6
-
SHA1
c74efa3f75abf7aa1f44423e5624e84da4e5de32
-
SHA256
94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc
-
SHA512
810eb62234fb0aba0763145382c5bbe29eeb92b693230c6eff333b6956d8e952de8264df41c97fbc88d5c1e97974cfe7524977bb0d1b56e5cb8347e05aff4a10
-
SSDEEP
12288:zMrEy90ou2WwxhDlJXTc2vVunFJMSpwUQxj9OVeWh4QFJdJ6bcZy4oNruGnX9h8P:PyvpWClJXT/uB8G7ak36bcZd2tiP
Static task
static1
Behavioral task
behavioral1
Sample
94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Targets
-
-
Target
94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc
-
Size
661KB
-
MD5
b2f4d0b5b5e1090d39a37d8efd7c0eb6
-
SHA1
c74efa3f75abf7aa1f44423e5624e84da4e5de32
-
SHA256
94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc
-
SHA512
810eb62234fb0aba0763145382c5bbe29eeb92b693230c6eff333b6956d8e952de8264df41c97fbc88d5c1e97974cfe7524977bb0d1b56e5cb8347e05aff4a10
-
SSDEEP
12288:zMrEy90ou2WwxhDlJXTc2vVunFJMSpwUQxj9OVeWh4QFJdJ6bcZy4oNruGnX9h8P:PyvpWClJXT/uB8G7ak36bcZd2tiP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1