General
-
Target
debaf7dcf5d1f90f362f901696b335f9644d6bccb725655756b9bcd0b6911e41
-
Size
560KB
-
Sample
230803-17k16ahe6t
-
MD5
3f08a00227a18122b7fe6de3a798b94e
-
SHA1
0799bcec58703c516b60a1c032f403e052f3f30a
-
SHA256
debaf7dcf5d1f90f362f901696b335f9644d6bccb725655756b9bcd0b6911e41
-
SHA512
926adea9309954dbab17c5af302cb7fa5b01955db747caa459e5c41cbbf5553b77db67ff696849ba226534def969cf1441910c8906f9ffc795ac28b21f26cc4f
-
SSDEEP
12288:yMrvy90u3ejjNuR9wCIpk2vLLiRTbQ1+pJm:JytRDwtk2DLobQALm
Static task
static1
Behavioral task
behavioral1
Sample
debaf7dcf5d1f90f362f901696b335f9644d6bccb725655756b9bcd0b6911e41.exe
Resource
win10-20230703-en
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
debaf7dcf5d1f90f362f901696b335f9644d6bccb725655756b9bcd0b6911e41
-
Size
560KB
-
MD5
3f08a00227a18122b7fe6de3a798b94e
-
SHA1
0799bcec58703c516b60a1c032f403e052f3f30a
-
SHA256
debaf7dcf5d1f90f362f901696b335f9644d6bccb725655756b9bcd0b6911e41
-
SHA512
926adea9309954dbab17c5af302cb7fa5b01955db747caa459e5c41cbbf5553b77db67ff696849ba226534def969cf1441910c8906f9ffc795ac28b21f26cc4f
-
SSDEEP
12288:yMrvy90u3ejjNuR9wCIpk2vLLiRTbQ1+pJm:JytRDwtk2DLobQALm
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1