General
-
Target
02aa0fc5038ff29adaae24ca2acfe61d.exe
-
Size
513KB
-
Sample
230707-gj64yage2v
-
MD5
02aa0fc5038ff29adaae24ca2acfe61d
-
SHA1
9b7255fc02a7821d7cbc2d3a452115b58045e9ff
-
SHA256
c0e8f4969bba14ab50315506d2afcce58104d1c493bb62b3fd7ca86c25723a41
-
SHA512
8420c04135709d690ff63b9fd05d4e942df0a4245c5521ed1f4f7113fd752cec7b075953c26409ca22447851af3f60ade3525777146f2bee187a72c07a4f96ac
-
SSDEEP
12288:EQDTyfvFaRdnQgjj6wLtGXB88cHNYAsiLOp:E0TYvF82gjO7xcHNYFiKp
Static task
static1
Behavioral task
behavioral1
Sample
02aa0fc5038ff29adaae24ca2acfe61d.exe
Resource
win7-20230705-en
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Targets
-
-
Target
02aa0fc5038ff29adaae24ca2acfe61d.exe
-
Size
513KB
-
MD5
02aa0fc5038ff29adaae24ca2acfe61d
-
SHA1
9b7255fc02a7821d7cbc2d3a452115b58045e9ff
-
SHA256
c0e8f4969bba14ab50315506d2afcce58104d1c493bb62b3fd7ca86c25723a41
-
SHA512
8420c04135709d690ff63b9fd05d4e942df0a4245c5521ed1f4f7113fd752cec7b075953c26409ca22447851af3f60ade3525777146f2bee187a72c07a4f96ac
-
SSDEEP
12288:EQDTyfvFaRdnQgjj6wLtGXB88cHNYAsiLOp:E0TYvF82gjO7xcHNYFiKp
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-