General
-
Target
deb2a5f7c2f5be85bbd479a2b1360e7bfd016bbb89601d79ae9612f450f436e0.exe
-
Size
801KB
-
Sample
241126-x3zf7ssjeq
-
MD5
d5b9b093f42bc4d00efc7eb8bc5ba089
-
SHA1
597b0797ba6e3e817cff79ff7b10b8bfae61b856
-
SHA256
deb2a5f7c2f5be85bbd479a2b1360e7bfd016bbb89601d79ae9612f450f436e0
-
SHA512
9039d633b1335c13429c31133e4e88acbb4953dc92006ff03c90a72555d6cc376d0239ff628062357b911bb544c55bf7e1ac391872e5db7a0b605c374d5e833b
-
SSDEEP
24576:tyL1IDRcTWwx3lZ+U7Qo8Bpn9PeN4KX7D:IpIDWNxVcQ8HnNeNn
Static task
static1
Behavioral task
behavioral1
Sample
deb2a5f7c2f5be85bbd479a2b1360e7bfd016bbb89601d79ae9612f450f436e0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Targets
-
-
Target
deb2a5f7c2f5be85bbd479a2b1360e7bfd016bbb89601d79ae9612f450f436e0.exe
-
Size
801KB
-
MD5
d5b9b093f42bc4d00efc7eb8bc5ba089
-
SHA1
597b0797ba6e3e817cff79ff7b10b8bfae61b856
-
SHA256
deb2a5f7c2f5be85bbd479a2b1360e7bfd016bbb89601d79ae9612f450f436e0
-
SHA512
9039d633b1335c13429c31133e4e88acbb4953dc92006ff03c90a72555d6cc376d0239ff628062357b911bb544c55bf7e1ac391872e5db7a0b605c374d5e833b
-
SSDEEP
24576:tyL1IDRcTWwx3lZ+U7Qo8Bpn9PeN4KX7D:IpIDWNxVcQ8HnNeNn
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1