General
-
Target
7de64a49cbd146e02357a78cf63211f23a6d0460779b1d55373c5573a2eef979
-
Size
390KB
-
Sample
230721-w9cqcagf23
-
MD5
aed909d2ae11a21af4a42170efb4f3a8
-
SHA1
44d446fa1c05375af222a084d51a633542cd50b9
-
SHA256
7de64a49cbd146e02357a78cf63211f23a6d0460779b1d55373c5573a2eef979
-
SHA512
dcdc8347ff505677cbbbbf5b3daa4fa08c8f2a6d567c6ec9ffb54ed09c6250145309816738f830078986f8c31597ded0b7265da73a510f306caf1010a1cf726c
-
SSDEEP
6144:KOy+bnr+Op0yN90QEHu6qHgA7cTzT0+qx5YRzf6TxzxzP/IFSNHOb2LpG7d:WMrqy90MHv7IvgYFf6pxzPArFx
Static task
static1
Behavioral task
behavioral1
Sample
7de64a49cbd146e02357a78cf63211f23a6d0460779b1d55373c5573a2eef979.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
redline
grom
77.91.68.68:19071
-
auth_value
9ec3129bff410b89097d656d7abc33dc
Targets
-
-
Target
7de64a49cbd146e02357a78cf63211f23a6d0460779b1d55373c5573a2eef979
-
Size
390KB
-
MD5
aed909d2ae11a21af4a42170efb4f3a8
-
SHA1
44d446fa1c05375af222a084d51a633542cd50b9
-
SHA256
7de64a49cbd146e02357a78cf63211f23a6d0460779b1d55373c5573a2eef979
-
SHA512
dcdc8347ff505677cbbbbf5b3daa4fa08c8f2a6d567c6ec9ffb54ed09c6250145309816738f830078986f8c31597ded0b7265da73a510f306caf1010a1cf726c
-
SSDEEP
6144:KOy+bnr+Op0yN90QEHu6qHgA7cTzT0+qx5YRzf6TxzxzP/IFSNHOb2LpG7d:WMrqy90MHv7IvgYFf6pxzPArFx
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1