General
-
Target
3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f
-
Size
650KB
-
Sample
241113-z21nzszbqm
-
MD5
3f1c0a4f3be23aa4e95025ad3cca0a83
-
SHA1
3ce9704f135bd2abef5b334580a5006c8f0b1adb
-
SHA256
3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f
-
SHA512
4018d68eea1e2d8400361493e21f8f5799ad198b1fb8f40bafd9bc08af8ae11e3ff7de87bbfba6da1115f3ce7685e2c54b841b59bd5d32ef1912e912702fd995
-
SSDEEP
12288:/Mruy90COcq6aLKb9nVppEqE+YP7d07ZDmtZBlEv8Q4sJtkm:hynCL2EqE+YPSxmvsUfsrkm
Static task
static1
Behavioral task
behavioral1
Sample
3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Targets
-
-
Target
3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f
-
Size
650KB
-
MD5
3f1c0a4f3be23aa4e95025ad3cca0a83
-
SHA1
3ce9704f135bd2abef5b334580a5006c8f0b1adb
-
SHA256
3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f
-
SHA512
4018d68eea1e2d8400361493e21f8f5799ad198b1fb8f40bafd9bc08af8ae11e3ff7de87bbfba6da1115f3ce7685e2c54b841b59bd5d32ef1912e912702fd995
-
SSDEEP
12288:/Mruy90COcq6aLKb9nVppEqE+YP7d07ZDmtZBlEv8Q4sJtkm:hynCL2EqE+YPSxmvsUfsrkm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1