General
-
Target
4393da84c84d32b0d45a627c90967314cbfc39ee4943e2d340a972588861e39eexe_JC.exe
-
Size
517KB
-
Sample
230802-xlqsqsad7w
-
MD5
8c5f0a86d24e743721749ff040e9fec8
-
SHA1
f4c5231aa2476e8172b11b82db84e0df5ec13e35
-
SHA256
4393da84c84d32b0d45a627c90967314cbfc39ee4943e2d340a972588861e39e
-
SHA512
5861643f5475681d0fd0751756a0088a12c2196be56e3080306ce715012fd7a45ff4dd16ca66c4b6fbb8589c55cc545420153deeff6ed31fc5e388f086500fcc
-
SSDEEP
12288:JMrNy90puEj4iu40NFIj2FWzlDRpGzRhvrxu0v:Ay6rElBNFeIWzDYrxu0
Static task
static1
Behavioral task
behavioral1
Sample
4393da84c84d32b0d45a627c90967314cbfc39ee4943e2d340a972588861e39eexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4393da84c84d32b0d45a627c90967314cbfc39ee4943e2d340a972588861e39eexe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Targets
-
-
Target
4393da84c84d32b0d45a627c90967314cbfc39ee4943e2d340a972588861e39eexe_JC.exe
-
Size
517KB
-
MD5
8c5f0a86d24e743721749ff040e9fec8
-
SHA1
f4c5231aa2476e8172b11b82db84e0df5ec13e35
-
SHA256
4393da84c84d32b0d45a627c90967314cbfc39ee4943e2d340a972588861e39e
-
SHA512
5861643f5475681d0fd0751756a0088a12c2196be56e3080306ce715012fd7a45ff4dd16ca66c4b6fbb8589c55cc545420153deeff6ed31fc5e388f086500fcc
-
SSDEEP
12288:JMrNy90puEj4iu40NFIj2FWzlDRpGzRhvrxu0v:Ay6rElBNFeIWzDYrxu0
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1