General
-
Target
cd626f1accbb9febe40f1a4f168bac37c1f51815d3d9ad633cc163ca5977b2a2
-
Size
852KB
-
Sample
241107-m5e58s1enm
-
MD5
90c04c71ac912fe9813564dc29002b13
-
SHA1
fb48410d576f5d4ef7f1f2cbf7c40b3a5a6e927a
-
SHA256
cd626f1accbb9febe40f1a4f168bac37c1f51815d3d9ad633cc163ca5977b2a2
-
SHA512
861970de22c961c06389fa15dd3046478c744b65d0ed2eb21b20584c9e4ce216e4779246f4907956771a9790ba193652477f711c00e88f0435f2014e38b4a1d3
-
SSDEEP
12288:wMrky907sMs5XOOipjCtH3mCJM5byse5tLp6drWy91CadyaRuM1rMpS4NIrVmkUy:EyqJsWWCILAWyTCa0aRuuYpS4NIAY
Static task
static1
Behavioral task
behavioral1
Sample
cd626f1accbb9febe40f1a4f168bac37c1f51815d3d9ad633cc163ca5977b2a2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
cd626f1accbb9febe40f1a4f168bac37c1f51815d3d9ad633cc163ca5977b2a2
-
Size
852KB
-
MD5
90c04c71ac912fe9813564dc29002b13
-
SHA1
fb48410d576f5d4ef7f1f2cbf7c40b3a5a6e927a
-
SHA256
cd626f1accbb9febe40f1a4f168bac37c1f51815d3d9ad633cc163ca5977b2a2
-
SHA512
861970de22c961c06389fa15dd3046478c744b65d0ed2eb21b20584c9e4ce216e4779246f4907956771a9790ba193652477f711c00e88f0435f2014e38b4a1d3
-
SSDEEP
12288:wMrky907sMs5XOOipjCtH3mCJM5byse5tLp6drWy91CadyaRuM1rMpS4NIrVmkUy:EyqJsWWCILAWyTCa0aRuuYpS4NIAY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1