General
-
Target
8145c9923d9e26b5dd8b4d1ccbe96a725f7e8461f97a085feca9bc601153e1a3
-
Size
641KB
-
Sample
230802-vxhv6aga66
-
MD5
ab837b028c4a296f3e79be807f1ff844
-
SHA1
848c29e1c0073504e90c5957f82c78659d768115
-
SHA256
8145c9923d9e26b5dd8b4d1ccbe96a725f7e8461f97a085feca9bc601153e1a3
-
SHA512
7b6f7a4706e95aa3f5a2047a1e3fe3188528182cd09d145368aa5f0cbd8f722ae8841cd2e0b6e50b3950cd3863ccadac075f2809947c8c0194de18b0095f1dd5
-
SSDEEP
12288:FMrKy9090drEICTnD+XOLBz/CqqywihiA1Ra5H2vOSzy/+jUh:rym0dazCQtqq7PidQOSzy/+jUh
Static task
static1
Behavioral task
behavioral1
Sample
8145c9923d9e26b5dd8b4d1ccbe96a725f7e8461f97a085feca9bc601153e1a3.exe
Resource
win10-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
8145c9923d9e26b5dd8b4d1ccbe96a725f7e8461f97a085feca9bc601153e1a3
-
Size
641KB
-
MD5
ab837b028c4a296f3e79be807f1ff844
-
SHA1
848c29e1c0073504e90c5957f82c78659d768115
-
SHA256
8145c9923d9e26b5dd8b4d1ccbe96a725f7e8461f97a085feca9bc601153e1a3
-
SHA512
7b6f7a4706e95aa3f5a2047a1e3fe3188528182cd09d145368aa5f0cbd8f722ae8841cd2e0b6e50b3950cd3863ccadac075f2809947c8c0194de18b0095f1dd5
-
SSDEEP
12288:FMrKy9090drEICTnD+XOLBz/CqqywihiA1Ra5H2vOSzy/+jUh:rym0dazCQtqq7PidQOSzy/+jUh
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1