General
-
Target
d3ffd4dbbec9f0d5d23e41013c0ccfa410fbe647792f40c5bc6dd00c643865e9
-
Size
516KB
-
Sample
230803-k5cn1ace53
-
MD5
d88093e2934fe9d3a591c8e319d0c4ad
-
SHA1
ff4dce2e1d384785061e231ba008e69881f10735
-
SHA256
d3ffd4dbbec9f0d5d23e41013c0ccfa410fbe647792f40c5bc6dd00c643865e9
-
SHA512
84d854c9546f358535bcb33a8895347786861677c4c14567c6d057b5f3d48958b0acce54aeeb3ca24ffea776f7d49c390961aa41986e491d5d93d8a59efb1033
-
SSDEEP
12288:QMrKy90FPyhY5C4AD9PzmqlfgBYCmgN71gOMlaIcmq:KyrYsF9mpzPN76ObItq
Static task
static1
Behavioral task
behavioral1
Sample
d3ffd4dbbec9f0d5d23e41013c0ccfa410fbe647792f40c5bc6dd00c643865e9.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
d3ffd4dbbec9f0d5d23e41013c0ccfa410fbe647792f40c5bc6dd00c643865e9
-
Size
516KB
-
MD5
d88093e2934fe9d3a591c8e319d0c4ad
-
SHA1
ff4dce2e1d384785061e231ba008e69881f10735
-
SHA256
d3ffd4dbbec9f0d5d23e41013c0ccfa410fbe647792f40c5bc6dd00c643865e9
-
SHA512
84d854c9546f358535bcb33a8895347786861677c4c14567c6d057b5f3d48958b0acce54aeeb3ca24ffea776f7d49c390961aa41986e491d5d93d8a59efb1033
-
SSDEEP
12288:QMrKy90FPyhY5C4AD9PzmqlfgBYCmgN71gOMlaIcmq:KyrYsF9mpzPN76ObItq
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1