General
-
Target
e00e2ca8f12e507e65af3a_JC.exe
-
Size
390KB
-
Sample
230729-qstpmsea3z
-
MD5
16acc22694ecfcc716e627c9ac16e0ee
-
SHA1
36c4ffa86b2c9b84366c070b724fc2e045464861
-
SHA256
e00e2ca8f12e507e65af3a0f955e168a1a3176477281a44f1e84c17ff30b679d
-
SHA512
0496f086ddb81c395cee395decb176379f4299f57fb106fecf261b8d246ecaf31ef08313ab75947bb7b25893177a5ddf52a07816a864825828537fa134fa9024
-
SSDEEP
6144:KAy+bnr+9p0yN90QE9sdj6Ys9YmzXpa60OTyUkJGu1yAJaooiq/jU:8Mrxy90vs1yYCXpV0OTypVaotn
Static task
static1
Behavioral task
behavioral1
Sample
e00e2ca8f12e507e65af3a_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e00e2ca8f12e507e65af3a_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
5.42.92.67/norm/index.php
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Targets
-
-
Target
e00e2ca8f12e507e65af3a_JC.exe
-
Size
390KB
-
MD5
16acc22694ecfcc716e627c9ac16e0ee
-
SHA1
36c4ffa86b2c9b84366c070b724fc2e045464861
-
SHA256
e00e2ca8f12e507e65af3a0f955e168a1a3176477281a44f1e84c17ff30b679d
-
SHA512
0496f086ddb81c395cee395decb176379f4299f57fb106fecf261b8d246ecaf31ef08313ab75947bb7b25893177a5ddf52a07816a864825828537fa134fa9024
-
SSDEEP
6144:KAy+bnr+9p0yN90QE9sdj6Ys9YmzXpa60OTyUkJGu1yAJaooiq/jU:8Mrxy90vs1yYCXpV0OTypVaotn
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1