General
-
Target
0c10cee4480de1f94dd19ca043f99fb1cfea1f10e35b551932cc436bf5ad8d61N.exe
-
Size
560KB
-
Sample
241118-s12rbsyrfz
-
MD5
29a0faa2b2043832a3330fd8c7e2e020
-
SHA1
b32a63524d279cbcefaba01b0c79c03b124dffa5
-
SHA256
0c10cee4480de1f94dd19ca043f99fb1cfea1f10e35b551932cc436bf5ad8d61
-
SHA512
ef858137d6730f8869171069e8fa34e12e650d1f15e6afd30a2bc78fd7382620a9bbe8b5ffd38b31ac042a2a0decaaa5a1d2b80d770cf6ea4e3c290da25103b5
-
SSDEEP
12288:9MrMy900mUa4cON0WYtfXNe+EFpUJri/hnk0NNuDqd/:JyNa4cONkfXNLEcJqSW8DM
Static task
static1
Behavioral task
behavioral1
Sample
0c10cee4480de1f94dd19ca043f99fb1cfea1f10e35b551932cc436bf5ad8d61N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Targets
-
-
Target
0c10cee4480de1f94dd19ca043f99fb1cfea1f10e35b551932cc436bf5ad8d61N.exe
-
Size
560KB
-
MD5
29a0faa2b2043832a3330fd8c7e2e020
-
SHA1
b32a63524d279cbcefaba01b0c79c03b124dffa5
-
SHA256
0c10cee4480de1f94dd19ca043f99fb1cfea1f10e35b551932cc436bf5ad8d61
-
SHA512
ef858137d6730f8869171069e8fa34e12e650d1f15e6afd30a2bc78fd7382620a9bbe8b5ffd38b31ac042a2a0decaaa5a1d2b80d770cf6ea4e3c290da25103b5
-
SSDEEP
12288:9MrMy900mUa4cON0WYtfXNe+EFpUJri/hnk0NNuDqd/:JyNa4cONkfXNLEcJqSW8DM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1