General
-
Target
0e7c8949d1c4baab0bb02d727f8f1ef88db1d81ef769a.exe
-
Size
3.6MB
-
Sample
230706-mfylaaaa35
-
MD5
3a6cfe8e7653ce410d2fc055238dcc23
-
SHA1
3a4ae20d099c82d8aaa8d1e525bc044e48bed395
-
SHA256
0e7c8949d1c4baab0bb02d727f8f1ef88db1d81ef769aa3df6d16ef17574f4bd
-
SHA512
7b30197521e8311ad6b2769a0d1cb9c8d4b73424512e3c64661c185882bc39e03cb63a228f84f94ddfbb8fb9b22f5191d199f6b6eb2f1309d500a1d7fdacad6b
-
SSDEEP
49152:difqy3vEO+bJa+tJ9KReTkomjxefV5ddUiyy5X7tB3bTpuL3yMcSt55IcxNr2L10:PyfFzohdFRLzX01ph
Static task
static1
Behavioral task
behavioral1
Sample
0e7c8949d1c4baab0bb02d727f8f1ef88db1d81ef769a.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
0e7c8949d1c4baab0bb02d727f8f1ef88db1d81ef769a.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Targets
-
-
Target
0e7c8949d1c4baab0bb02d727f8f1ef88db1d81ef769a.exe
-
Size
3.6MB
-
MD5
3a6cfe8e7653ce410d2fc055238dcc23
-
SHA1
3a4ae20d099c82d8aaa8d1e525bc044e48bed395
-
SHA256
0e7c8949d1c4baab0bb02d727f8f1ef88db1d81ef769aa3df6d16ef17574f4bd
-
SHA512
7b30197521e8311ad6b2769a0d1cb9c8d4b73424512e3c64661c185882bc39e03cb63a228f84f94ddfbb8fb9b22f5191d199f6b6eb2f1309d500a1d7fdacad6b
-
SSDEEP
49152:difqy3vEO+bJa+tJ9KReTkomjxefV5ddUiyy5X7tB3bTpuL3yMcSt55IcxNr2L10:PyfFzohdFRLzX01ph
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-