General
-
Target
41acf53e4129a1e56cb494263eca7548102f68fd4acfc088c8e3fef83e0ffa1a
-
Size
670KB
-
Sample
241108-jds18sxnbx
-
MD5
b7d6797339466259142bc180d296b27c
-
SHA1
5e8540ecdf58b5d1bf90af605fed9607cab1c86c
-
SHA256
41acf53e4129a1e56cb494263eca7548102f68fd4acfc088c8e3fef83e0ffa1a
-
SHA512
ead035c73654cbe2db12754a9a69cc0237e7bba2242965b8b4752c029aa5b472df4c358872499cf81524efcd1b62b192d1b12a4c5549ca439465e5a2dc9daa11
-
SSDEEP
12288:FMrky90ho+4Nkad2u2ufYqdWlhV1riq1A5vQcnsoVsVizv2VmEMHN:xyGo+41d2u9fYqdod1A5vQcnh6i3E6
Static task
static1
Behavioral task
behavioral1
Sample
41acf53e4129a1e56cb494263eca7548102f68fd4acfc088c8e3fef83e0ffa1a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
41acf53e4129a1e56cb494263eca7548102f68fd4acfc088c8e3fef83e0ffa1a
-
Size
670KB
-
MD5
b7d6797339466259142bc180d296b27c
-
SHA1
5e8540ecdf58b5d1bf90af605fed9607cab1c86c
-
SHA256
41acf53e4129a1e56cb494263eca7548102f68fd4acfc088c8e3fef83e0ffa1a
-
SHA512
ead035c73654cbe2db12754a9a69cc0237e7bba2242965b8b4752c029aa5b472df4c358872499cf81524efcd1b62b192d1b12a4c5549ca439465e5a2dc9daa11
-
SSDEEP
12288:FMrky90ho+4Nkad2u2ufYqdWlhV1riq1A5vQcnsoVsVizv2VmEMHN:xyGo+41d2u9fYqdod1A5vQcnh6i3E6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1