General
-
Target
46f14c7eafe0fd6e49a86d0d9a9f45773117077795f19c9a8db08c649475eb4cN.exe
-
Size
506KB
-
Sample
241115-y4ph3avmhq
-
MD5
4907a61ae08d6a0ce366f826f967c270
-
SHA1
3f49d0a79408b98920f1f48d2fa674ec73fb9724
-
SHA256
46f14c7eafe0fd6e49a86d0d9a9f45773117077795f19c9a8db08c649475eb4c
-
SHA512
a849d00d19557a52d04f908699a39f96fd8ee22390a8be108cfd652c2d34f800744987cb8b2233f780f29dfbc2bf1a557921e0c46338bff3a572699e15f5d0fa
-
SSDEEP
12288:1MrWy90eHtWzTRPYYPXe4Ov/lEslDTc22ry:vyzHGAYWPv/l1c2D
Static task
static1
Behavioral task
behavioral1
Sample
46f14c7eafe0fd6e49a86d0d9a9f45773117077795f19c9a8db08c649475eb4cN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Targets
-
-
Target
46f14c7eafe0fd6e49a86d0d9a9f45773117077795f19c9a8db08c649475eb4cN.exe
-
Size
506KB
-
MD5
4907a61ae08d6a0ce366f826f967c270
-
SHA1
3f49d0a79408b98920f1f48d2fa674ec73fb9724
-
SHA256
46f14c7eafe0fd6e49a86d0d9a9f45773117077795f19c9a8db08c649475eb4c
-
SHA512
a849d00d19557a52d04f908699a39f96fd8ee22390a8be108cfd652c2d34f800744987cb8b2233f780f29dfbc2bf1a557921e0c46338bff3a572699e15f5d0fa
-
SSDEEP
12288:1MrWy90eHtWzTRPYYPXe4Ov/lEslDTc22ry:vyzHGAYWPv/l1c2D
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1