General
-
Target
3d8207c38e9a25da01e58ebefeffe30cc32be8772bbd69f6021d22d6a20eebf2
-
Size
517KB
-
Sample
230801-w9x2aaag25
-
MD5
7acab3a68ababe50ec1e10211edab25a
-
SHA1
35bb33fd59c432dfc0f403e2b142f31fe24cee44
-
SHA256
3d8207c38e9a25da01e58ebefeffe30cc32be8772bbd69f6021d22d6a20eebf2
-
SHA512
075f69b0a717c806a1999c04d1d310194fcb4c2bfcac17779b95edfb04f777f20f1647a82e2dcc953d39f3b61603225c27cff8cc39ae53c589052f261ad1d4ec
-
SSDEEP
12288:bMr0iy90FTHmKKoHuCeYt0sJuNYQ+bnMFe:UyiTHJKjCexsJuNQ5
Static task
static1
Malware Config
Extracted
amadey
3.86
5.42.92.67/norm/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Extracted
redline
@oleh_ps
176.123.9.85:16482
-
auth_value
24848220823af15a5e52db502394fad3
Targets
-
-
Target
3d8207c38e9a25da01e58ebefeffe30cc32be8772bbd69f6021d22d6a20eebf2
-
Size
517KB
-
MD5
7acab3a68ababe50ec1e10211edab25a
-
SHA1
35bb33fd59c432dfc0f403e2b142f31fe24cee44
-
SHA256
3d8207c38e9a25da01e58ebefeffe30cc32be8772bbd69f6021d22d6a20eebf2
-
SHA512
075f69b0a717c806a1999c04d1d310194fcb4c2bfcac17779b95edfb04f777f20f1647a82e2dcc953d39f3b61603225c27cff8cc39ae53c589052f261ad1d4ec
-
SSDEEP
12288:bMr0iy90FTHmKKoHuCeYt0sJuNYQ+bnMFe:UyiTHJKjCexsJuNQ5
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1