General
-
Target
c371e88d7c7b512ac19f5eb8a3d5458c407cbefd92295a007fb9b8ce5dffba00
-
Size
642KB
-
Sample
230801-xarwnaag27
-
MD5
09c6a53579a89787bcf2a91923e69281
-
SHA1
5bfc95587561a268b9ccd32740b3d4d4f7831b9c
-
SHA256
c371e88d7c7b512ac19f5eb8a3d5458c407cbefd92295a007fb9b8ce5dffba00
-
SHA512
b63496f10d3cf0521f6b63e0edb2dad16d4ce7c835e067a63bb82effa9e851632510a1a094c7a9270cf3953fbe302f72c9c63e02be600dae4d9761123b05031f
-
SSDEEP
12288:8MrLy90N4fdPWjdk3PxSAeoBhi1xJPedar4HrljuGNE2nCL/o:XyNdPWKPxSHKhcWEARjuGq3Q
Static task
static1
Behavioral task
behavioral1
Sample
c371e88d7c7b512ac19f5eb8a3d5458c407cbefd92295a007fb9b8ce5dffba00.exe
Resource
win10-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
c371e88d7c7b512ac19f5eb8a3d5458c407cbefd92295a007fb9b8ce5dffba00
-
Size
642KB
-
MD5
09c6a53579a89787bcf2a91923e69281
-
SHA1
5bfc95587561a268b9ccd32740b3d4d4f7831b9c
-
SHA256
c371e88d7c7b512ac19f5eb8a3d5458c407cbefd92295a007fb9b8ce5dffba00
-
SHA512
b63496f10d3cf0521f6b63e0edb2dad16d4ce7c835e067a63bb82effa9e851632510a1a094c7a9270cf3953fbe302f72c9c63e02be600dae4d9761123b05031f
-
SSDEEP
12288:8MrLy90N4fdPWjdk3PxSAeoBhi1xJPedar4HrljuGNE2nCL/o:XyNdPWKPxSHKhcWEARjuGq3Q
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1