General
-
Target
d548a11e7e2c4a2afbc8f6e13e35d75fa7444c20740a4ea6d37a9dcf8bc9fd2d.exe
-
Size
1.2MB
-
Sample
241119-gfdyzswlen
-
MD5
d51f44355e1887c6c76515ec4418ad8a
-
SHA1
bbf8e10298a17fff9d31229a2dac5eb9be65ae40
-
SHA256
d548a11e7e2c4a2afbc8f6e13e35d75fa7444c20740a4ea6d37a9dcf8bc9fd2d
-
SHA512
7b9adb06c087e431d7f158317352953351b3c2a6dd18a8dc92a6494773c8b85255e635e3a941420bb805af5393413b130be3b9ea7b511644343d6bf87d52df9b
-
SSDEEP
24576:Jy/PlVhzVananoxlRVv1LREdo+hlhvTjNCRhS2NS3JCOa5:8/HaaslRwtIN+UOY
Static task
static1
Behavioral task
behavioral1
Sample
d548a11e7e2c4a2afbc8f6e13e35d75fa7444c20740a4ea6d37a9dcf8bc9fd2d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
soft
77.91.124.146:4121
-
auth_value
e65663e455bca3c5699650b66e76ceaa
Extracted
redline
dirx
77.91.124.146:4121
-
auth_value
522d988f763be056e53e089f74d464cc
Targets
-
-
Target
d548a11e7e2c4a2afbc8f6e13e35d75fa7444c20740a4ea6d37a9dcf8bc9fd2d.exe
-
Size
1.2MB
-
MD5
d51f44355e1887c6c76515ec4418ad8a
-
SHA1
bbf8e10298a17fff9d31229a2dac5eb9be65ae40
-
SHA256
d548a11e7e2c4a2afbc8f6e13e35d75fa7444c20740a4ea6d37a9dcf8bc9fd2d
-
SHA512
7b9adb06c087e431d7f158317352953351b3c2a6dd18a8dc92a6494773c8b85255e635e3a941420bb805af5393413b130be3b9ea7b511644343d6bf87d52df9b
-
SSDEEP
24576:Jy/PlVhzVananoxlRVv1LREdo+hlhvTjNCRhS2NS3JCOa5:8/HaaslRwtIN+UOY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1