General
-
Target
9d4967dcda8dedc2ede59948627d648fd7f320e97a8e633551af42292a53d65aN.exe
-
Size
647KB
-
Sample
241114-la2kbaxbjj
-
MD5
2f4db1f76ca8ea9d37c3c4ec23ad59c0
-
SHA1
8e2d27cad82d598e1595fda338b3693fb4eb1552
-
SHA256
9d4967dcda8dedc2ede59948627d648fd7f320e97a8e633551af42292a53d65a
-
SHA512
925124f32f64ed1300336ee29e7cc96b59b8dcfe39df0fa682cb601789465317f8ad37672190563157dfd5f06b59eb2f61b975d669d9b53a2bfff6d6c4315b58
-
SSDEEP
12288:9Mr7y902PI8fM0K4w0tDSOp1EdjQhwh9ZPjBf6sytEYz728US8ctuSun:myzvM0KM71Ed82h9ZPjBgzf28UHTSun
Static task
static1
Behavioral task
behavioral1
Sample
9d4967dcda8dedc2ede59948627d648fd7f320e97a8e633551af42292a53d65aN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Targets
-
-
Target
9d4967dcda8dedc2ede59948627d648fd7f320e97a8e633551af42292a53d65aN.exe
-
Size
647KB
-
MD5
2f4db1f76ca8ea9d37c3c4ec23ad59c0
-
SHA1
8e2d27cad82d598e1595fda338b3693fb4eb1552
-
SHA256
9d4967dcda8dedc2ede59948627d648fd7f320e97a8e633551af42292a53d65a
-
SHA512
925124f32f64ed1300336ee29e7cc96b59b8dcfe39df0fa682cb601789465317f8ad37672190563157dfd5f06b59eb2f61b975d669d9b53a2bfff6d6c4315b58
-
SSDEEP
12288:9Mr7y902PI8fM0K4w0tDSOp1EdjQhwh9ZPjBf6sytEYz728US8ctuSun:myzvM0KM71Ed82h9ZPjBgzf28UHTSun
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1