General
-
Target
9da344c721698ab43e513d0176c3635c8cc3f70268c69248bff43cb94aedf70a
-
Size
670KB
-
Sample
241105-lpm1gaxrhy
-
MD5
49201876ac419407c6171e309d0c267b
-
SHA1
68ac8886d799df56a0ccf086845ebec323b54356
-
SHA256
9da344c721698ab43e513d0176c3635c8cc3f70268c69248bff43cb94aedf70a
-
SHA512
07579ad855cdf63ce21bbe652b1aafade6bb81c9ca19f2905c9643f3ef317e0e70f63b056e2810750b19a73c73ec2f15c03fd4daff9e0aa3696708f9b8bc7c85
-
SSDEEP
12288:wMr2y90E3vO5uBG+3h4uYhv1r/g4A5vf49//1sV54RRn9n4eqS:WydvOsG+OR24A5vf491654RRnx4eX
Static task
static1
Behavioral task
behavioral1
Sample
9da344c721698ab43e513d0176c3635c8cc3f70268c69248bff43cb94aedf70a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
9da344c721698ab43e513d0176c3635c8cc3f70268c69248bff43cb94aedf70a
-
Size
670KB
-
MD5
49201876ac419407c6171e309d0c267b
-
SHA1
68ac8886d799df56a0ccf086845ebec323b54356
-
SHA256
9da344c721698ab43e513d0176c3635c8cc3f70268c69248bff43cb94aedf70a
-
SHA512
07579ad855cdf63ce21bbe652b1aafade6bb81c9ca19f2905c9643f3ef317e0e70f63b056e2810750b19a73c73ec2f15c03fd4daff9e0aa3696708f9b8bc7c85
-
SSDEEP
12288:wMr2y90E3vO5uBG+3h4uYhv1r/g4A5vf49//1sV54RRn9n4eqS:WydvOsG+OR24A5vf491654RRnx4eX
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1