General
-
Target
fd122de7d76eb99973237d2aca4d7b5ffd1947d669d9035a3315c2c56c555c72
-
Size
641KB
-
Sample
230802-jgh1fadd93
-
MD5
d60134ad15f3ea63fbd09a69be7d5f4d
-
SHA1
d83f9a95b724e0aa829570b5ab00091c51a6ad31
-
SHA256
fd122de7d76eb99973237d2aca4d7b5ffd1947d669d9035a3315c2c56c555c72
-
SHA512
2b11cef70d113fb4f8154bd36433b6956881121b3b7392fd8bd70fa2f2df76032a4a2fd0b592dfbe4df647507bf7440b8287f328e66fbc8839dc0d93cb652ee7
-
SSDEEP
12288:kMrvy906W592i/PKotF7RDqN//ljZ+T8TEAqT/3v0rE+YR7HNv/y7qb6hPTOBr:jyNqd/PKoL7RDA9g8TJqWYVp67LEN
Static task
static1
Behavioral task
behavioral1
Sample
fd122de7d76eb99973237d2aca4d7b5ffd1947d669d9035a3315c2c56c555c72.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
fd122de7d76eb99973237d2aca4d7b5ffd1947d669d9035a3315c2c56c555c72
-
Size
641KB
-
MD5
d60134ad15f3ea63fbd09a69be7d5f4d
-
SHA1
d83f9a95b724e0aa829570b5ab00091c51a6ad31
-
SHA256
fd122de7d76eb99973237d2aca4d7b5ffd1947d669d9035a3315c2c56c555c72
-
SHA512
2b11cef70d113fb4f8154bd36433b6956881121b3b7392fd8bd70fa2f2df76032a4a2fd0b592dfbe4df647507bf7440b8287f328e66fbc8839dc0d93cb652ee7
-
SSDEEP
12288:kMrvy906W592i/PKotF7RDqN//ljZ+T8TEAqT/3v0rE+YR7HNv/y7qb6hPTOBr:jyNqd/PKoL7RDA9g8TJqWYVp67LEN
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1