General
-
Target
e87c3d6f95c5dc7546050851e41d97128eacec370ea2fec3f98f6898d6f8e9a6N.exe
-
Size
1.0MB
-
Sample
250212-nprprszjcm
-
MD5
b2c2a5efc738583edea2ba3046b3bbc0
-
SHA1
7fa98c61f18d2520899bcd047a8de9bebdbeb35c
-
SHA256
e87c3d6f95c5dc7546050851e41d97128eacec370ea2fec3f98f6898d6f8e9a6
-
SHA512
f35a538299eebfa98ea334e3a0df1a3ae04fe632b89609e4257dcf32a5dc2022d35f2a4a1732f2b50e73f85c7109363dd42fe6f516cf699b32469f27ac5a52a1
-
SSDEEP
24576:ryK/7sSRz9KPC7kfx05OHm8Bbz4Wp7zVkmhCJZY9k:eKQSRz8f018V4KzVrCJa
Static task
static1
Behavioral task
behavioral1
Sample
e87c3d6f95c5dc7546050851e41d97128eacec370ea2fec3f98f6898d6f8e9a6N.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
e87c3d6f95c5dc7546050851e41d97128eacec370ea2fec3f98f6898d6f8e9a6N.exe
-
Size
1.0MB
-
MD5
b2c2a5efc738583edea2ba3046b3bbc0
-
SHA1
7fa98c61f18d2520899bcd047a8de9bebdbeb35c
-
SHA256
e87c3d6f95c5dc7546050851e41d97128eacec370ea2fec3f98f6898d6f8e9a6
-
SHA512
f35a538299eebfa98ea334e3a0df1a3ae04fe632b89609e4257dcf32a5dc2022d35f2a4a1732f2b50e73f85c7109363dd42fe6f516cf699b32469f27ac5a52a1
-
SSDEEP
24576:ryK/7sSRz9KPC7kfx05OHm8Bbz4Wp7zVkmhCJZY9k:eKQSRz8f018V4KzVrCJa
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4