General
-
Target
91ada931a7df377a081f7c94a90f614a58cdcf9307737b42066447d8bdde159d
-
Size
651KB
-
Sample
241111-atg48sybrm
-
MD5
8274b67d806098dcdc2842387dcafbb5
-
SHA1
38fadcafadf6a19f87563a5cb894618731e1607a
-
SHA256
91ada931a7df377a081f7c94a90f614a58cdcf9307737b42066447d8bdde159d
-
SHA512
a6e0b87c63dcf39a22941fd921aa99d30f507cb8d50323d87d68b1016f50e56287d68f06fa77cb5d512333466b3f0ba686c92e68a040743a78ed93632f344c0b
-
SSDEEP
12288:2Mr/y90YfVJW2tC3mbMKMbKO7c03FpgGwKGr86krurwYFB/:JytNJLOmbHMmOl0GAvkruEYFB/
Static task
static1
Behavioral task
behavioral1
Sample
91ada931a7df377a081f7c94a90f614a58cdcf9307737b42066447d8bdde159d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Targets
-
-
Target
91ada931a7df377a081f7c94a90f614a58cdcf9307737b42066447d8bdde159d
-
Size
651KB
-
MD5
8274b67d806098dcdc2842387dcafbb5
-
SHA1
38fadcafadf6a19f87563a5cb894618731e1607a
-
SHA256
91ada931a7df377a081f7c94a90f614a58cdcf9307737b42066447d8bdde159d
-
SHA512
a6e0b87c63dcf39a22941fd921aa99d30f507cb8d50323d87d68b1016f50e56287d68f06fa77cb5d512333466b3f0ba686c92e68a040743a78ed93632f344c0b
-
SSDEEP
12288:2Mr/y90YfVJW2tC3mbMKMbKO7c03FpgGwKGr86krurwYFB/:JytNJLOmbHMmOl0GAvkruEYFB/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1