General
-
Target
e93558b862ae428f469fc3e24408c79832ce3920059d5f0beb254b1561c5fe07
-
Size
935KB
-
Sample
241111-cy7a2azmcy
-
MD5
742ec7b0f5819ad8a64dfa470a214338
-
SHA1
a003b7ea84b97cb4981ee3e5b7b090821b0bfa4c
-
SHA256
e93558b862ae428f469fc3e24408c79832ce3920059d5f0beb254b1561c5fe07
-
SHA512
0dcb033495cb3c82df7d977106a5c937e95a66fa50d3bec4c513d1c8f039bf03d6d3424299a46882e2d20835b3fc8ca81feef18f54983793963761b5a432c316
-
SSDEEP
24576:8yzjlJn3Yjr6nVYaXljPXSxKRYorM67hNmezg:rzJJn3YjreXj6KFXYQ
Static task
static1
Behavioral task
behavioral1
Sample
e93558b862ae428f469fc3e24408c79832ce3920059d5f0beb254b1561c5fe07.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Targets
-
-
Target
e93558b862ae428f469fc3e24408c79832ce3920059d5f0beb254b1561c5fe07
-
Size
935KB
-
MD5
742ec7b0f5819ad8a64dfa470a214338
-
SHA1
a003b7ea84b97cb4981ee3e5b7b090821b0bfa4c
-
SHA256
e93558b862ae428f469fc3e24408c79832ce3920059d5f0beb254b1561c5fe07
-
SHA512
0dcb033495cb3c82df7d977106a5c937e95a66fa50d3bec4c513d1c8f039bf03d6d3424299a46882e2d20835b3fc8ca81feef18f54983793963761b5a432c316
-
SSDEEP
24576:8yzjlJn3Yjr6nVYaXljPXSxKRYorM67hNmezg:rzJJn3YjreXj6KFXYQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1