General
-
Target
0d7a81cf618950168a3f39cd3a746f33fb46f2074f5ac7bf48c6a5bd713f4257.exe
-
Size
647KB
-
Sample
241120-d6agpszlhs
-
MD5
b6010553a2e4c71848aa482f4d2f0184
-
SHA1
6558b8b4694e8af5553e397001871d95895df71c
-
SHA256
0d7a81cf618950168a3f39cd3a746f33fb46f2074f5ac7bf48c6a5bd713f4257
-
SHA512
db1aca8d7a88cc517f1c480a6846f649ddd5ff19a5407eb87cedd8c977d9459c23086cf712336993be07d7afaf249240c45cdb063f5ff30bd6cc8bc27083a0d7
-
SSDEEP
12288:TMrDy900MFEeI8f10K4f69HYFPQhwC4ZdjBf6KytDYz728JSpctokNdHUc:YymFEK10KdHYY2C4ZdjBS8f28JCId0c
Static task
static1
Behavioral task
behavioral1
Sample
0d7a81cf618950168a3f39cd3a746f33fb46f2074f5ac7bf48c6a5bd713f4257.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Targets
-
-
Target
0d7a81cf618950168a3f39cd3a746f33fb46f2074f5ac7bf48c6a5bd713f4257.exe
-
Size
647KB
-
MD5
b6010553a2e4c71848aa482f4d2f0184
-
SHA1
6558b8b4694e8af5553e397001871d95895df71c
-
SHA256
0d7a81cf618950168a3f39cd3a746f33fb46f2074f5ac7bf48c6a5bd713f4257
-
SHA512
db1aca8d7a88cc517f1c480a6846f649ddd5ff19a5407eb87cedd8c977d9459c23086cf712336993be07d7afaf249240c45cdb063f5ff30bd6cc8bc27083a0d7
-
SSDEEP
12288:TMrDy900MFEeI8f10K4f69HYFPQhwC4ZdjBf6KytDYz728JSpctokNdHUc:YymFEK10KdHYY2C4ZdjBS8f28JCId0c
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1