General
-
Target
ea5483b9cb8d90ab4ceb5b8fe2cc517334e720b1b5b2af00788094cde601acc4
-
Size
712KB
-
Sample
241108-xskv3axjaz
-
MD5
817de002ff06c2d1c701d639b20f687b
-
SHA1
161b5741927e43c56a92d849e3a877de059c223d
-
SHA256
ea5483b9cb8d90ab4ceb5b8fe2cc517334e720b1b5b2af00788094cde601acc4
-
SHA512
761f25dc93e0b0531a3e8d0502e0126018747ce8b79270c698df7ebcfdf042a58a26113a46dbd5fb0f54c320efcfd91c58fd0876afd1a628e04e5e6cc485253b
-
SSDEEP
12288:cMrXy90yK8x0h6x45uN7CwWQUi6CZNdrePHWOYTH3kUGC//bBu:by/1x00X7DWQh6CZPKPHWzH3k2//du
Static task
static1
Behavioral task
behavioral1
Sample
ea5483b9cb8d90ab4ceb5b8fe2cc517334e720b1b5b2af00788094cde601acc4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
ea5483b9cb8d90ab4ceb5b8fe2cc517334e720b1b5b2af00788094cde601acc4
-
Size
712KB
-
MD5
817de002ff06c2d1c701d639b20f687b
-
SHA1
161b5741927e43c56a92d849e3a877de059c223d
-
SHA256
ea5483b9cb8d90ab4ceb5b8fe2cc517334e720b1b5b2af00788094cde601acc4
-
SHA512
761f25dc93e0b0531a3e8d0502e0126018747ce8b79270c698df7ebcfdf042a58a26113a46dbd5fb0f54c320efcfd91c58fd0876afd1a628e04e5e6cc485253b
-
SSDEEP
12288:cMrXy90yK8x0h6x45uN7CwWQUi6CZNdrePHWOYTH3kUGC//bBu:by/1x00X7DWQh6CZPKPHWzH3k2//du
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1