General
-
Target
5549a5377f5a480ac1d1e15f471bfb7a50507a4aac558eeaa02c57559acc8d95
-
Size
850KB
-
Sample
241108-d3zx7avcll
-
MD5
071fa1849caa662079db1b7e39bfe77c
-
SHA1
85d878f358b33acb4637b2686787dbe7f33c391e
-
SHA256
5549a5377f5a480ac1d1e15f471bfb7a50507a4aac558eeaa02c57559acc8d95
-
SHA512
7fef58d1ee4d4eb9171b3d13875d95f4d21fbb8397a7907cfb3bad31c2895158fe02f3b7efb7ecef08b13b3e93ad18e491d19a1f34867d8d939fb3141d983a0a
-
SSDEEP
12288:VMrMy90MafN5KzFmQ95YOcsi/DS0H029px8dnrDS14GktFa1Lw2nI:Ryafml5+TU29bs44aNRnI
Static task
static1
Behavioral task
behavioral1
Sample
5549a5377f5a480ac1d1e15f471bfb7a50507a4aac558eeaa02c57559acc8d95.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
5549a5377f5a480ac1d1e15f471bfb7a50507a4aac558eeaa02c57559acc8d95
-
Size
850KB
-
MD5
071fa1849caa662079db1b7e39bfe77c
-
SHA1
85d878f358b33acb4637b2686787dbe7f33c391e
-
SHA256
5549a5377f5a480ac1d1e15f471bfb7a50507a4aac558eeaa02c57559acc8d95
-
SHA512
7fef58d1ee4d4eb9171b3d13875d95f4d21fbb8397a7907cfb3bad31c2895158fe02f3b7efb7ecef08b13b3e93ad18e491d19a1f34867d8d939fb3141d983a0a
-
SSDEEP
12288:VMrMy90MafN5KzFmQ95YOcsi/DS0H029px8dnrDS14GktFa1Lw2nI:Ryafml5+TU29bs44aNRnI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1