General
-
Target
4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43
-
Size
851KB
-
Sample
241107-j9czwsxrgs
-
MD5
b2990f1c699ef180444bd7d4f8b9da52
-
SHA1
72a71d18f550722eff74c9923c49805de3a14818
-
SHA256
4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43
-
SHA512
834c72e9def66323ff000659215d049d3509e957f923e9e061a161ccc0baf4479543be099a2581bf5b3ba610fa90a170ae170321119b56af3c0c1cb958f6f1fa
-
SSDEEP
24576:uyDPWpRCahWZwMXjeoclhydK4Drk4MoA:97WbCahUXdc3AKOk47
Static task
static1
Behavioral task
behavioral1
Sample
4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43
-
Size
851KB
-
MD5
b2990f1c699ef180444bd7d4f8b9da52
-
SHA1
72a71d18f550722eff74c9923c49805de3a14818
-
SHA256
4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43
-
SHA512
834c72e9def66323ff000659215d049d3509e957f923e9e061a161ccc0baf4479543be099a2581bf5b3ba610fa90a170ae170321119b56af3c0c1cb958f6f1fa
-
SSDEEP
24576:uyDPWpRCahWZwMXjeoclhydK4Drk4MoA:97WbCahUXdc3AKOk47
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1