General
-
Target
943aa34914154c4ead0fdca7c1315512.exe
-
Size
518KB
-
Sample
230707-km8zgsha8w
-
MD5
943aa34914154c4ead0fdca7c1315512
-
SHA1
cccd8929c3dff9343037efc4c61dff368f291836
-
SHA256
cce421005e10444fd442c576f197545e092c3d8ca6635dff082f51b43893f9cc
-
SHA512
35d2d9295285bc91343ddfc388da57dce823ea4605e2e46122ee52496939fb6e00a8a85115cccad17d1913dcffcc6520f32259be592ae99dbaf3389d533b5fd9
-
SSDEEP
12288:bpk+FSfviaRdnQgHmdR2HU5fOOUv2v+G8iz:bpk+Gvi82gRGmOU2v/L
Static task
static1
Behavioral task
behavioral1
Sample
943aa34914154c4ead0fdca7c1315512.exe
Resource
win7-20230703-en
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Targets
-
-
Target
943aa34914154c4ead0fdca7c1315512.exe
-
Size
518KB
-
MD5
943aa34914154c4ead0fdca7c1315512
-
SHA1
cccd8929c3dff9343037efc4c61dff368f291836
-
SHA256
cce421005e10444fd442c576f197545e092c3d8ca6635dff082f51b43893f9cc
-
SHA512
35d2d9295285bc91343ddfc388da57dce823ea4605e2e46122ee52496939fb6e00a8a85115cccad17d1913dcffcc6520f32259be592ae99dbaf3389d533b5fd9
-
SSDEEP
12288:bpk+FSfviaRdnQgHmdR2HU5fOOUv2v+G8iz:bpk+Gvi82gRGmOU2v/L
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-