General
-
Target
dd28757ba337789b9a949b429a6dd126f498846bfdc22e0aae928380e5db0a85
-
Size
1.0MB
-
Sample
241111-bzplyazapn
-
MD5
b550ea8ae211d27302212c8ad9063dce
-
SHA1
e2839c44bfb3d96632977fc5c901e77ba426e086
-
SHA256
dd28757ba337789b9a949b429a6dd126f498846bfdc22e0aae928380e5db0a85
-
SHA512
56faf9624e3e9e5dc5e1e932d0a6eef3311b56dc18bb4a75da398860403e70c8202d99f70d559a004d0d1bc9398bbc2d05821a97b87b1a75c2838fd02fd8f7ef
-
SSDEEP
24576:OywkWX4luRsI0LCfbzv1YClaNyXyw+SZBtDEC+nO9Gi9K9:dwkWXSueIFfbz9YCUiQuKC+nO
Static task
static1
Behavioral task
behavioral1
Sample
dd28757ba337789b9a949b429a6dd126f498846bfdc22e0aae928380e5db0a85.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
dizon
77.91.124.145:4125
-
auth_value
047038ed6238aaee09c368831591e935
Targets
-
-
Target
dd28757ba337789b9a949b429a6dd126f498846bfdc22e0aae928380e5db0a85
-
Size
1.0MB
-
MD5
b550ea8ae211d27302212c8ad9063dce
-
SHA1
e2839c44bfb3d96632977fc5c901e77ba426e086
-
SHA256
dd28757ba337789b9a949b429a6dd126f498846bfdc22e0aae928380e5db0a85
-
SHA512
56faf9624e3e9e5dc5e1e932d0a6eef3311b56dc18bb4a75da398860403e70c8202d99f70d559a004d0d1bc9398bbc2d05821a97b87b1a75c2838fd02fd8f7ef
-
SSDEEP
24576:OywkWX4luRsI0LCfbzv1YClaNyXyw+SZBtDEC+nO9Gi9K9:dwkWXSueIFfbz9YCUiQuKC+nO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1