General
-
Target
9cffbeab785ee93b4b4a08fdee575395f4f62c197bfee7f57337301ca85aaa46
-
Size
515KB
-
Sample
230723-e5zkwadh4x
-
MD5
baacff8d6c1d47e3dfc5f8c4149cb8e9
-
SHA1
c8f8b699b0f89c465297450ad74105d94892e95e
-
SHA256
9cffbeab785ee93b4b4a08fdee575395f4f62c197bfee7f57337301ca85aaa46
-
SHA512
b615ecc01107bfcc0b1162dc267a02eaa8341eb5de49ab1dbe03c3f50a06dae6866e64cf5944cbf20110bb1112ae503b9f85d737649d342f904a22758157d13f
-
SSDEEP
12288:2Mr1y90nqlCmof7PmiWqZwFomZN/wjY+Vz:zyufjcqZ0FwjY+Vz
Static task
static1
Behavioral task
behavioral1
Sample
9cffbeab785ee93b4b4a08fdee575395f4f62c197bfee7f57337301ca85aaa46.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Targets
-
-
Target
9cffbeab785ee93b4b4a08fdee575395f4f62c197bfee7f57337301ca85aaa46
-
Size
515KB
-
MD5
baacff8d6c1d47e3dfc5f8c4149cb8e9
-
SHA1
c8f8b699b0f89c465297450ad74105d94892e95e
-
SHA256
9cffbeab785ee93b4b4a08fdee575395f4f62c197bfee7f57337301ca85aaa46
-
SHA512
b615ecc01107bfcc0b1162dc267a02eaa8341eb5de49ab1dbe03c3f50a06dae6866e64cf5944cbf20110bb1112ae503b9f85d737649d342f904a22758157d13f
-
SSDEEP
12288:2Mr1y90nqlCmof7PmiWqZwFomZN/wjY+Vz:zyufjcqZ0FwjY+Vz
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1