General
-
Target
6ed2b8a8ebd12e15a3f922433bde14076d01e1f787bfd4ef582729b9eeb777b8
-
Size
671KB
-
Sample
241105-xa8jeaxbnp
-
MD5
db9093598a5a5df86f5643e5d075ac92
-
SHA1
d34ce66e1f41becfbb791d3b46c0f022139190d7
-
SHA256
6ed2b8a8ebd12e15a3f922433bde14076d01e1f787bfd4ef582729b9eeb777b8
-
SHA512
a0b4b0e62a8b1b767be116b46c5c844b9d09b59df64940a02d02258b9019b8dbdd8fa83d519e9796572265765a34a9975e8215483a53aa0e729a17a10acd4403
-
SSDEEP
12288:yMrSy90qzVtizXrep9jkW4m+Nc0A52IcCGr:sypTiz7ULQ1ANLGr
Static task
static1
Behavioral task
behavioral1
Sample
6ed2b8a8ebd12e15a3f922433bde14076d01e1f787bfd4ef582729b9eeb777b8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
6ed2b8a8ebd12e15a3f922433bde14076d01e1f787bfd4ef582729b9eeb777b8
-
Size
671KB
-
MD5
db9093598a5a5df86f5643e5d075ac92
-
SHA1
d34ce66e1f41becfbb791d3b46c0f022139190d7
-
SHA256
6ed2b8a8ebd12e15a3f922433bde14076d01e1f787bfd4ef582729b9eeb777b8
-
SHA512
a0b4b0e62a8b1b767be116b46c5c844b9d09b59df64940a02d02258b9019b8dbdd8fa83d519e9796572265765a34a9975e8215483a53aa0e729a17a10acd4403
-
SSDEEP
12288:yMrSy90qzVtizXrep9jkW4m+Nc0A52IcCGr:sypTiz7ULQ1ANLGr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1