General
-
Target
0a8f339ae6c973a0dea009f256cfc87d.exe
-
Size
784KB
-
Sample
230707-kmkxnaha7y
-
MD5
0a8f339ae6c973a0dea009f256cfc87d
-
SHA1
e7783fc6e26f815fd5b78640835061c3aa80a39d
-
SHA256
810e5b9465e90eb13f6cbe0fd8e0f4c2da6ad05324efdf13a3d5897159283b6a
-
SHA512
8be477ee9b13674217e043f20d930fd334f73d0a0cc498e5d5f12e8de5c5090f1d2d56baff657dca6dc0d22d7f79deafc9e8eababd92b78f274300952f2d9f4f
-
SSDEEP
24576:D5UoHOvv82gjaze0DODYWuNFrwWhAbOogVT:D5Zu81ee0S8xNV7AeT
Static task
static1
Behavioral task
behavioral1
Sample
0a8f339ae6c973a0dea009f256cfc87d.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
0a8f339ae6c973a0dea009f256cfc87d.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Targets
-
-
Target
0a8f339ae6c973a0dea009f256cfc87d.exe
-
Size
784KB
-
MD5
0a8f339ae6c973a0dea009f256cfc87d
-
SHA1
e7783fc6e26f815fd5b78640835061c3aa80a39d
-
SHA256
810e5b9465e90eb13f6cbe0fd8e0f4c2da6ad05324efdf13a3d5897159283b6a
-
SHA512
8be477ee9b13674217e043f20d930fd334f73d0a0cc498e5d5f12e8de5c5090f1d2d56baff657dca6dc0d22d7f79deafc9e8eababd92b78f274300952f2d9f4f
-
SSDEEP
24576:D5UoHOvv82gjaze0DODYWuNFrwWhAbOogVT:D5Zu81ee0S8xNV7AeT
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-