General
-
Target
82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5
-
Size
660KB
-
Sample
241111-a2t4rsxray
-
MD5
3ca3b3ab00c86782dac5bf45b2f4fdc6
-
SHA1
06fecff11bd5b8a3c388a4373b272eb14f449bfa
-
SHA256
82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5
-
SHA512
b1c9ec0d4cb369eb14909efee88de72bc78f32da74d02099458863665714a2d35833b58d0021bc053ef2695b58ceda4d43ac4700993425b1f8339ec3a6f7aebb
-
SSDEEP
12288:tMrgy90bkOsNvFSYQC0OqF9r+awB/MPTecS8ZicC9yqbQT8n5bEh3XLGDS5:NyGapwM05r+awO/n6ySg3h5
Static task
static1
Behavioral task
behavioral1
Sample
82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Targets
-
-
Target
82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5
-
Size
660KB
-
MD5
3ca3b3ab00c86782dac5bf45b2f4fdc6
-
SHA1
06fecff11bd5b8a3c388a4373b272eb14f449bfa
-
SHA256
82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5
-
SHA512
b1c9ec0d4cb369eb14909efee88de72bc78f32da74d02099458863665714a2d35833b58d0021bc053ef2695b58ceda4d43ac4700993425b1f8339ec3a6f7aebb
-
SSDEEP
12288:tMrgy90bkOsNvFSYQC0OqF9r+awB/MPTecS8ZicC9yqbQT8n5bEh3XLGDS5:NyGapwM05r+awO/n6ySg3h5
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1