General
-
Target
33dfb30c21ef3decd50574754f122d4e29200c035c0ecdbbe93794314492ca14
-
Size
514KB
-
Sample
230724-getcaaae9z
-
MD5
10646661561626493d1c875aa4ec5b23
-
SHA1
d5bcb542d6ba897936bde34c53cdd78e28c4dd85
-
SHA256
33dfb30c21ef3decd50574754f122d4e29200c035c0ecdbbe93794314492ca14
-
SHA512
871bf905fa86351b186eb93b8076d2f91ef05f347f1fbc34bd4c9c22632124483cd8ef5280b0075d02708369c06cc599c5b1f0c30e850a43bb1bb4dfadcea01d
-
SSDEEP
12288:aMr1y90h+7FGcdaNNyJuKith+gHoHmFfCfbyu1xQ98Zt:Hyhhzamu2zfbxjQKb
Static task
static1
Behavioral task
behavioral1
Sample
33dfb30c21ef3decd50574754f122d4e29200c035c0ecdbbe93794314492ca14.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Targets
-
-
Target
33dfb30c21ef3decd50574754f122d4e29200c035c0ecdbbe93794314492ca14
-
Size
514KB
-
MD5
10646661561626493d1c875aa4ec5b23
-
SHA1
d5bcb542d6ba897936bde34c53cdd78e28c4dd85
-
SHA256
33dfb30c21ef3decd50574754f122d4e29200c035c0ecdbbe93794314492ca14
-
SHA512
871bf905fa86351b186eb93b8076d2f91ef05f347f1fbc34bd4c9c22632124483cd8ef5280b0075d02708369c06cc599c5b1f0c30e850a43bb1bb4dfadcea01d
-
SSDEEP
12288:aMr1y90h+7FGcdaNNyJuKith+gHoHmFfCfbyu1xQ98Zt:Hyhhzamu2zfbxjQKb
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1