General
-
Target
cdcecd3749891f697a0af96762cb9124.bin
-
Size
346KB
-
Sample
230721-b84r8acc5s
-
MD5
7e1896e64def2665649ed1f85bfabc4b
-
SHA1
0d20393dd273aaf538ed3b874b295a2571790b3d
-
SHA256
a9d1d8541b0c9a55da5429a7d63c84eda62fe21817a667a869b6f76415aa635c
-
SHA512
e10f3c24b0a2b58a882d830e70e93ec0b9ab143bc66969035ac55e68370c163d0330dd0a63bad2c8a6edd08dc4905e62f6432a99d54f4f370e1ecff2fb794f71
-
SSDEEP
6144:08B8yDN6VUDpL+EDvqMJinzWJkOdIgf6GSZR9T7+4s6JeojEozXW:0DOsVUD0EWXnz+i2uZ/3e0Lq
Static task
static1
Behavioral task
behavioral1
Sample
42aaf3452f3dbd3fec800b9307def7e1463e88016e6585d09719f8642ef8f491.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
42aaf3452f3dbd3fec800b9307def7e1463e88016e6585d09719f8642ef8f491.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Targets
-
-
Target
42aaf3452f3dbd3fec800b9307def7e1463e88016e6585d09719f8642ef8f491.exe
-
Size
389KB
-
MD5
cdcecd3749891f697a0af96762cb9124
-
SHA1
b31636aa34b1b3eeb7caefef82c37f2f093c6b64
-
SHA256
42aaf3452f3dbd3fec800b9307def7e1463e88016e6585d09719f8642ef8f491
-
SHA512
3e6576b30044df2139e96401cf30439229ca0dfc3f3df77d4fcad7aefb5f9ae2112df018e8fb655505d0ea79eee96ff2580aa148d60cd93fddc55255d37bd044
-
SSDEEP
6144:KOy+bnr+3p0yN90QEHP8pAkeKHGqQ4ewNu043Hvyj6qxNnUvDrqmPB:eMrny90himqQXWMHG6qX+rx
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1