General
-
Target
7a48b3323c65c0b43f5e82d564b590101d893e83b6fa806e40d177ed28f9d462
-
Size
514KB
-
Sample
230717-k9ezxsba77
-
MD5
5f8be4a2c4f46a938cf12e8677bce3cf
-
SHA1
8041f19c681e692d0e1ea88aae40b8307730dd23
-
SHA256
7a48b3323c65c0b43f5e82d564b590101d893e83b6fa806e40d177ed28f9d462
-
SHA512
469a0d1d0214887c4a5d5857e9c395529bc4016f55433e44d92fcb265364e5c023a212b05b6d65734057ea77928eac4e253a4935219ba54b153b07af6f99688e
-
SSDEEP
12288:XMrLy90Uj/40+9utrGnqVWpTrHyguyWZx297/r2:IyTj4eVoiJyWL297C
Static task
static1
Behavioral task
behavioral1
Sample
7a48b3323c65c0b43f5e82d564b590101d893e83b6fa806e40d177ed28f9d462.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
zahar
77.91.68.56:19071
-
auth_value
94c55a31fcf1761f07eeb4a0c6fb74fa
Targets
-
-
Target
7a48b3323c65c0b43f5e82d564b590101d893e83b6fa806e40d177ed28f9d462
-
Size
514KB
-
MD5
5f8be4a2c4f46a938cf12e8677bce3cf
-
SHA1
8041f19c681e692d0e1ea88aae40b8307730dd23
-
SHA256
7a48b3323c65c0b43f5e82d564b590101d893e83b6fa806e40d177ed28f9d462
-
SHA512
469a0d1d0214887c4a5d5857e9c395529bc4016f55433e44d92fcb265364e5c023a212b05b6d65734057ea77928eac4e253a4935219ba54b153b07af6f99688e
-
SSDEEP
12288:XMrLy90Uj/40+9utrGnqVWpTrHyguyWZx297/r2:IyTj4eVoiJyWL297C
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-