General
-
Target
630e9a7ececc848c300b101072a77b2ebc7e8f8879caacf350b2cb8c0b4436db
-
Size
713KB
-
Sample
241107-nlvl9a1fne
-
MD5
abb805b45d5d29740071834088907a3a
-
SHA1
f3b5334f18eb9a3f499376c6bcfe59da532e82d1
-
SHA256
630e9a7ececc848c300b101072a77b2ebc7e8f8879caacf350b2cb8c0b4436db
-
SHA512
500fa9634563c83a2842ee2c83ee5493095e6f2e0f3b403e74603e89a2cb36040a57e91026699bc5634b7c8f0315370e7a6f74df8b8fd65e3e8907e864433917
-
SSDEEP
12288:VMrvy908IIK1eOyESYUb5sa2sVDbUoRE/RTT7RI39BQU3k6eDTzOVWBRX7jJWp3:SybdK4ORQ6Y9bU+QRTXsBpX0VJWp3
Static task
static1
Behavioral task
behavioral1
Sample
630e9a7ececc848c300b101072a77b2ebc7e8f8879caacf350b2cb8c0b4436db.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
630e9a7ececc848c300b101072a77b2ebc7e8f8879caacf350b2cb8c0b4436db
-
Size
713KB
-
MD5
abb805b45d5d29740071834088907a3a
-
SHA1
f3b5334f18eb9a3f499376c6bcfe59da532e82d1
-
SHA256
630e9a7ececc848c300b101072a77b2ebc7e8f8879caacf350b2cb8c0b4436db
-
SHA512
500fa9634563c83a2842ee2c83ee5493095e6f2e0f3b403e74603e89a2cb36040a57e91026699bc5634b7c8f0315370e7a6f74df8b8fd65e3e8907e864433917
-
SSDEEP
12288:VMrvy908IIK1eOyESYUb5sa2sVDbUoRE/RTT7RI39BQU3k6eDTzOVWBRX7jJWp3:SybdK4ORQ6Y9bU+QRTXsBpX0VJWp3
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1