General
-
Target
392f3d2260833e3e2575550a9de12606.exe
-
Size
691KB
-
Sample
230702-p8metsbf55
-
MD5
392f3d2260833e3e2575550a9de12606
-
SHA1
2a79b045eaf9e49642ae8eacd9991e926290620f
-
SHA256
83568a8dafd7d24fa7e7354ebcf0454600bc5bc6b6eae8343e4d3dd283378091
-
SHA512
1dfd659f3a2d4320a22a1d051bc8073bd20a4d685c551dceb2ff7f40de377d30984a74a47b7206cc4ad769860e5a8f3c7cfe0e991b55289105fae4abd070221e
-
SSDEEP
12288:QuGr0TvQ2PBsv3o0wpeccdRWcrY7eqD0bxvcmmqGkCz7:Qzr0Tx6nglcrS90bxcTj
Static task
static1
Behavioral task
behavioral1
Sample
392f3d2260833e3e2575550a9de12606.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
392f3d2260833e3e2575550a9de12606.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
redline
narko
83.97.73.134:19071
-
auth_value
a9d8c6db81c7e486f5832bc2ee48cb84
Extracted
amadey
3.81
95.214.27.98/cronus/index.php
Extracted
redline
newdomenbuil
urelishavea.online:80
-
auth_value
3f57eb8802ec1ee7acaa6e6da0537c27
Targets
-
-
Target
392f3d2260833e3e2575550a9de12606.exe
-
Size
691KB
-
MD5
392f3d2260833e3e2575550a9de12606
-
SHA1
2a79b045eaf9e49642ae8eacd9991e926290620f
-
SHA256
83568a8dafd7d24fa7e7354ebcf0454600bc5bc6b6eae8343e4d3dd283378091
-
SHA512
1dfd659f3a2d4320a22a1d051bc8073bd20a4d685c551dceb2ff7f40de377d30984a74a47b7206cc4ad769860e5a8f3c7cfe0e991b55289105fae4abd070221e
-
SSDEEP
12288:QuGr0TvQ2PBsv3o0wpeccdRWcrY7eqD0bxvcmmqGkCz7:Qzr0Tx6nglcrS90bxcTj
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-