General
-
Target
f77fcb060bb5c5ec234c9147279f5f9f258f2b70d6ade092435f1de3b844391e
-
Size
515KB
-
Sample
230719-jqkkmagf22
-
MD5
da3db809b7d76b4584d143cd61dcb8fc
-
SHA1
6a676f9673d080f6aaf5b3af0d7be5edc9f76457
-
SHA256
f77fcb060bb5c5ec234c9147279f5f9f258f2b70d6ade092435f1de3b844391e
-
SHA512
57d8b1ac1a0c7e46a9c8aae7cbe124869c65228c0e3c8eec8676713db852f986be8d52a4d2788c53d2cd6f2227c5b2e3509c9d06916986d65e4198b0e076d310
-
SSDEEP
6144:Kyy+bnr+3p0yN90QEb/wFpNXkTyaH13utCL1Bh5BxKl5zIjBMxKxxQ4c3l59Y/fi:uMrLy90RwrQxH13EUfBMxwcCjK+wD
Static task
static1
Behavioral task
behavioral1
Sample
f77fcb060bb5c5ec234c9147279f5f9f258f2b70d6ade092435f1de3b844391e.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Targets
-
-
Target
f77fcb060bb5c5ec234c9147279f5f9f258f2b70d6ade092435f1de3b844391e
-
Size
515KB
-
MD5
da3db809b7d76b4584d143cd61dcb8fc
-
SHA1
6a676f9673d080f6aaf5b3af0d7be5edc9f76457
-
SHA256
f77fcb060bb5c5ec234c9147279f5f9f258f2b70d6ade092435f1de3b844391e
-
SHA512
57d8b1ac1a0c7e46a9c8aae7cbe124869c65228c0e3c8eec8676713db852f986be8d52a4d2788c53d2cd6f2227c5b2e3509c9d06916986d65e4198b0e076d310
-
SSDEEP
6144:Kyy+bnr+3p0yN90QEb/wFpNXkTyaH13utCL1Bh5BxKl5zIjBMxKxxQ4c3l59Y/fi:uMrLy90RwrQxH13EUfBMxwcCjK+wD
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-