General
-
Target
746145d66a7e97bedd603256c08cfb876e714ad46eca3254531767b0fdd7d398
-
Size
678KB
-
Sample
230803-pgrv8sdb67
-
MD5
4fe68dd5809e92ecbdaee41dc66d7c7d
-
SHA1
db80ed6a048d78b950eba492a4136375e5c6357b
-
SHA256
746145d66a7e97bedd603256c08cfb876e714ad46eca3254531767b0fdd7d398
-
SHA512
0368fcc520c9181038ade75d844ded0cc7328b60be37ec1b03cdb465b0b6af5b33cf67a1133b3353085f7b5f7ec9ad6346685c171aa7956dfef111a6e591498d
-
SSDEEP
12288:NMrUy90RyDfNVWYsFfMetgcRQcDV6Hsx5D+vrI7MKVkXJjfP:Vy1lYYsvmcaySS5sMUfP
Static task
static1
Behavioral task
behavioral1
Sample
746145d66a7e97bedd603256c08cfb876e714ad46eca3254531767b0fdd7d398.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
746145d66a7e97bedd603256c08cfb876e714ad46eca3254531767b0fdd7d398
-
Size
678KB
-
MD5
4fe68dd5809e92ecbdaee41dc66d7c7d
-
SHA1
db80ed6a048d78b950eba492a4136375e5c6357b
-
SHA256
746145d66a7e97bedd603256c08cfb876e714ad46eca3254531767b0fdd7d398
-
SHA512
0368fcc520c9181038ade75d844ded0cc7328b60be37ec1b03cdb465b0b6af5b33cf67a1133b3353085f7b5f7ec9ad6346685c171aa7956dfef111a6e591498d
-
SSDEEP
12288:NMrUy90RyDfNVWYsFfMetgcRQcDV6Hsx5D+vrI7MKVkXJjfP:Vy1lYYsvmcaySS5sMUfP
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1