General
-
Target
f3e7893440885a9f4f619e2bfe3456e0.exe
-
Size
815KB
-
Sample
230702-jrjdysba45
-
MD5
f3e7893440885a9f4f619e2bfe3456e0
-
SHA1
adb2cc5e8e4f0f44aa69d04d004314ecd43f1d72
-
SHA256
1d2739827efeb74489a7391111427b580a2c79fd0a776b4d0881c3ab6555c085
-
SHA512
37410bcb360fde938730cf9f4aaa1df30c717ddce9d9a3f042f2e130ad84417fda967f72aea2bd7b9a917461d9c9cf49f475a734eb02db500e7390565aae0264
-
SSDEEP
12288:PZcjTQ2PBsEwMOIOhKtaacDeo/lf5NJwXrPg6/gXBCAWEnk4akYm4MSFzoMbZAS5:PZcjVrOI6UOp/rPMDg6GgA1ikgNbZlx
Static task
static1
Behavioral task
behavioral1
Sample
f3e7893440885a9f4f619e2bfe3456e0.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
f3e7893440885a9f4f619e2bfe3456e0.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
redline
narko
83.97.73.134:19071
-
auth_value
a9d8c6db81c7e486f5832bc2ee48cb84
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
bruno
83.97.73.134:19071
-
auth_value
b23e240c277e85ce9d49d6165c0a2b48
Targets
-
-
Target
f3e7893440885a9f4f619e2bfe3456e0.exe
-
Size
815KB
-
MD5
f3e7893440885a9f4f619e2bfe3456e0
-
SHA1
adb2cc5e8e4f0f44aa69d04d004314ecd43f1d72
-
SHA256
1d2739827efeb74489a7391111427b580a2c79fd0a776b4d0881c3ab6555c085
-
SHA512
37410bcb360fde938730cf9f4aaa1df30c717ddce9d9a3f042f2e130ad84417fda967f72aea2bd7b9a917461d9c9cf49f475a734eb02db500e7390565aae0264
-
SSDEEP
12288:PZcjTQ2PBsEwMOIOhKtaacDeo/lf5NJwXrPg6/gXBCAWEnk4akYm4MSFzoMbZAS5:PZcjVrOI6UOp/rPMDg6GgA1ikgNbZlx
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-