General
-
Target
4cddd48f4c2851e366f5331f9756bb8961be6c8b5c84cd4fb72829235e1fac0b
-
Size
637KB
-
Sample
230802-adnxvabh22
-
MD5
8d1be0ded1afea99e2b1da2751c9a465
-
SHA1
53a0671d12f50f83c771b4983f9f6094eab1d68c
-
SHA256
4cddd48f4c2851e366f5331f9756bb8961be6c8b5c84cd4fb72829235e1fac0b
-
SHA512
ac556cacf45bb3816b6cc17e1c3e3dd3ac8e824f4fc1c88fd29648926dd6bfaac61e6ab85ce1010784495d480bb0b95d958eb9770ef4822e5290f3f78bd8acf6
-
SSDEEP
12288:9MrNy90Mr8udNtZsWgbF9Ew1MEeiGBT1fIMmgSw9vfuxEw/Ao5m1GYpgP:4yf7dN7PkjMEeiQOgSEUa1rgP
Static task
static1
Behavioral task
behavioral1
Sample
4cddd48f4c2851e366f5331f9756bb8961be6c8b5c84cd4fb72829235e1fac0b.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
4cddd48f4c2851e366f5331f9756bb8961be6c8b5c84cd4fb72829235e1fac0b
-
Size
637KB
-
MD5
8d1be0ded1afea99e2b1da2751c9a465
-
SHA1
53a0671d12f50f83c771b4983f9f6094eab1d68c
-
SHA256
4cddd48f4c2851e366f5331f9756bb8961be6c8b5c84cd4fb72829235e1fac0b
-
SHA512
ac556cacf45bb3816b6cc17e1c3e3dd3ac8e824f4fc1c88fd29648926dd6bfaac61e6ab85ce1010784495d480bb0b95d958eb9770ef4822e5290f3f78bd8acf6
-
SSDEEP
12288:9MrNy90Mr8udNtZsWgbF9Ew1MEeiGBT1fIMmgSw9vfuxEw/Ao5m1GYpgP:4yf7dN7PkjMEeiQOgSEUa1rgP
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1