General
-
Target
90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554
-
Size
811KB
-
Sample
241111-asqd8axpe1
-
MD5
4de5051dd0d81c7fcc20683a193b83b1
-
SHA1
b4900821cc258eed86c172303d852e9cff290a01
-
SHA256
90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554
-
SHA512
130cfc6bd14b6f93954a5f4079116a2fb9f4f97590d5014ca8a56add4767e528abf9d0420053c2dcef8acb1330eed479cb28b0887aaf6b7c7d9ac7c0c92d0740
-
SSDEEP
12288:uy90vbZx1AaagxkNamvKEDk6vGqg2BoNE6uvLzRsTdv5:uy8DmaaxNryEDZwNEpH6
Static task
static1
Behavioral task
behavioral1
Sample
90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Targets
-
-
Target
90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554
-
Size
811KB
-
MD5
4de5051dd0d81c7fcc20683a193b83b1
-
SHA1
b4900821cc258eed86c172303d852e9cff290a01
-
SHA256
90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554
-
SHA512
130cfc6bd14b6f93954a5f4079116a2fb9f4f97590d5014ca8a56add4767e528abf9d0420053c2dcef8acb1330eed479cb28b0887aaf6b7c7d9ac7c0c92d0740
-
SSDEEP
12288:uy90vbZx1AaagxkNamvKEDk6vGqg2BoNE6uvLzRsTdv5:uy8DmaaxNryEDZwNEpH6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1