General
-
Target
7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6
-
Size
1.2MB
-
Sample
241104-q3kvgs1djn
-
MD5
c138b4ad338d4e6c6e509b18304b93cb
-
SHA1
45f4bdefb17524ae36e0f72536ef8de994ea5546
-
SHA256
7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6
-
SHA512
c1b6012d72e308a05a956d63ae4c4dcb05d12bfa2dfa56477ff397951d2ceb55bc86f6f1f7977bb3862e4be3926386699ec2825461105c5b8d7bcd06b013a883
-
SSDEEP
24576:2ymUbuNITkx2meCm43H85IF18M1P9NQ/KdWZAJu+vtg0349Z:F8JXjF18M1lW/KdWZatgJ
Static task
static1
Behavioral task
behavioral1
Sample
7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6
-
Size
1.2MB
-
MD5
c138b4ad338d4e6c6e509b18304b93cb
-
SHA1
45f4bdefb17524ae36e0f72536ef8de994ea5546
-
SHA256
7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6
-
SHA512
c1b6012d72e308a05a956d63ae4c4dcb05d12bfa2dfa56477ff397951d2ceb55bc86f6f1f7977bb3862e4be3926386699ec2825461105c5b8d7bcd06b013a883
-
SSDEEP
24576:2ymUbuNITkx2meCm43H85IF18M1P9NQ/KdWZAJu+vtg0349Z:F8JXjF18M1lW/KdWZatgJ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1