General
-
Target
30c9280810b3635965acfa14e28f8a7ed6bf05f61872bf187d20f613258aa876exe_JC.exe
-
Size
517KB
-
Sample
230801-t4xgfsaf4z
-
MD5
e4b638f3617148203f51b2a624561f0b
-
SHA1
d6cef74fca1cc76444625b2b5b7468f2b5a6d426
-
SHA256
30c9280810b3635965acfa14e28f8a7ed6bf05f61872bf187d20f613258aa876
-
SHA512
51f476ab8c0790a1e6ea771733ae67f6e4c45acc26de4c3b1af8b120aae155b19609fe7fa455dd0b3ef2466cb0144b0cf1e195b701da139422594a3dc928fe13
-
SSDEEP
12288:UMrDy90Eo2KVMBVjvt0cETyQ+2tpPz+SgBYCTAYrfGU81N:Hy2WRtrETNpvPz+hzkYG1N
Static task
static1
Behavioral task
behavioral1
Sample
30c9280810b3635965acfa14e28f8a7ed6bf05f61872bf187d20f613258aa876exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
30c9280810b3635965acfa14e28f8a7ed6bf05f61872bf187d20f613258aa876exe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Targets
-
-
Target
30c9280810b3635965acfa14e28f8a7ed6bf05f61872bf187d20f613258aa876exe_JC.exe
-
Size
517KB
-
MD5
e4b638f3617148203f51b2a624561f0b
-
SHA1
d6cef74fca1cc76444625b2b5b7468f2b5a6d426
-
SHA256
30c9280810b3635965acfa14e28f8a7ed6bf05f61872bf187d20f613258aa876
-
SHA512
51f476ab8c0790a1e6ea771733ae67f6e4c45acc26de4c3b1af8b120aae155b19609fe7fa455dd0b3ef2466cb0144b0cf1e195b701da139422594a3dc928fe13
-
SSDEEP
12288:UMrDy90Eo2KVMBVjvt0cETyQ+2tpPz+SgBYCTAYrfGU81N:Hy2WRtrETNpvPz+hzkYG1N
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1