General
-
Target
ef6d8ab5d7fe8ebbb8335c_JC.exe
-
Size
389KB
-
Sample
230729-s3n81sdh95
-
MD5
418fc764dacaf3c1a3ad6b1af4dbca6d
-
SHA1
c6551250dbe1ab2ec11d966f327a78c8bcf31c16
-
SHA256
ef6d8ab5d7fe8ebbb8335c0411ab527c8acc7bb8a12506c3a7738d1892c9d9f3
-
SHA512
a7d5493f7fdff46194b26a107125d7c11bc1175e1407d394000d09f61abdb9754fb99ca104501321ddd4e7ed55b23691779f0d62b744e8472e5a73f466116296
-
SSDEEP
6144:KEy+bnr+qp0yN90QEQ2GIut5T26ErN5dvA0R3pygBZ+t4iDa48h:MMrOy90mjhE57R3wgBYCiX8h
Static task
static1
Behavioral task
behavioral1
Sample
ef6d8ab5d7fe8ebbb8335c_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ef6d8ab5d7fe8ebbb8335c_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Targets
-
-
Target
ef6d8ab5d7fe8ebbb8335c_JC.exe
-
Size
389KB
-
MD5
418fc764dacaf3c1a3ad6b1af4dbca6d
-
SHA1
c6551250dbe1ab2ec11d966f327a78c8bcf31c16
-
SHA256
ef6d8ab5d7fe8ebbb8335c0411ab527c8acc7bb8a12506c3a7738d1892c9d9f3
-
SHA512
a7d5493f7fdff46194b26a107125d7c11bc1175e1407d394000d09f61abdb9754fb99ca104501321ddd4e7ed55b23691779f0d62b744e8472e5a73f466116296
-
SSDEEP
6144:KEy+bnr+qp0yN90QEQ2GIut5T26ErN5dvA0R3pygBZ+t4iDa48h:MMrOy90mjhE57R3wgBYCiX8h
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1