General
-
Target
6df901064bf967b6ed99894a3f63547fa8480d42e4738cbf40a780757378a2e3
-
Size
885KB
-
Sample
241110-1w6tgsyrfp
-
MD5
5f74e6b28bc1c434806d3d92a11ac62c
-
SHA1
76ceb0ce681fed7f30c2f79ef0d819ec2b14a965
-
SHA256
6df901064bf967b6ed99894a3f63547fa8480d42e4738cbf40a780757378a2e3
-
SHA512
7941be863a41f4f3fc68b8898ed56f7c3031596f11b8c7aae94a2b89056b51283e7276ae927030d8a51f66686e7de6a4203607de3a852bb6deb6b9f227b1d922
-
SSDEEP
24576:CyFJp/godzzWocEkHMmj/80d+ot2CWCvaJw:pRbz8Me/N4ojWCvU
Static task
static1
Behavioral task
behavioral1
Sample
6df901064bf967b6ed99894a3f63547fa8480d42e4738cbf40a780757378a2e3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
6df901064bf967b6ed99894a3f63547fa8480d42e4738cbf40a780757378a2e3
-
Size
885KB
-
MD5
5f74e6b28bc1c434806d3d92a11ac62c
-
SHA1
76ceb0ce681fed7f30c2f79ef0d819ec2b14a965
-
SHA256
6df901064bf967b6ed99894a3f63547fa8480d42e4738cbf40a780757378a2e3
-
SHA512
7941be863a41f4f3fc68b8898ed56f7c3031596f11b8c7aae94a2b89056b51283e7276ae927030d8a51f66686e7de6a4203607de3a852bb6deb6b9f227b1d922
-
SSDEEP
24576:CyFJp/godzzWocEkHMmj/80d+ot2CWCvaJw:pRbz8Me/N4ojWCvU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1