General
-
Target
3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564
-
Size
958KB
-
Sample
241110-1l8v4awemg
-
MD5
babc1ebde733835165ecf4cb6809620a
-
SHA1
c82aab97d369320b9f441d73221da0d645dbd84d
-
SHA256
3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564
-
SHA512
856ff460db30a6e72a444d584a175dfa4a3884209d7406352bdf7ec66e52c7d5e3adac321cb521edf65538b76a687570bf8ec7f785f758d7408773e57d999481
-
SSDEEP
24576:ZylPvUkr6Awm98vUUZ9MF4xZaLEuSsbkHJW9:MlPsawm98vtZS4xZaxVbAJW
Static task
static1
Behavioral task
behavioral1
Sample
3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Targets
-
-
Target
3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564
-
Size
958KB
-
MD5
babc1ebde733835165ecf4cb6809620a
-
SHA1
c82aab97d369320b9f441d73221da0d645dbd84d
-
SHA256
3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564
-
SHA512
856ff460db30a6e72a444d584a175dfa4a3884209d7406352bdf7ec66e52c7d5e3adac321cb521edf65538b76a687570bf8ec7f785f758d7408773e57d999481
-
SSDEEP
24576:ZylPvUkr6Awm98vUUZ9MF4xZaLEuSsbkHJW9:MlPsawm98vtZS4xZaxVbAJW
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1