General
-
Target
ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22
-
Size
560KB
-
Sample
230803-w2c15sgf8y
-
MD5
5513f3d8cbb6e64ccf49bfdceeb3d961
-
SHA1
78d873c98aaca4ab4114d8a531f6881d531e5524
-
SHA256
ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22
-
SHA512
b276cb3a1775a4e8de37dbbbe78148d0da25f03cb1ecdf2fa8ab5b90db7da40d25ab005a630274d61ca9e333916d6f371fcc117b1014881546ecff98cf0c1b95
-
SSDEEP
12288:RMrcy90P/w4BQBf5mNEIeISpiCx6BiazG3TQI1fB:VyQ/EvqKdpngB7GM6fB
Static task
static1
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22
-
Size
560KB
-
MD5
5513f3d8cbb6e64ccf49bfdceeb3d961
-
SHA1
78d873c98aaca4ab4114d8a531f6881d531e5524
-
SHA256
ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22
-
SHA512
b276cb3a1775a4e8de37dbbbe78148d0da25f03cb1ecdf2fa8ab5b90db7da40d25ab005a630274d61ca9e333916d6f371fcc117b1014881546ecff98cf0c1b95
-
SSDEEP
12288:RMrcy90P/w4BQBf5mNEIeISpiCx6BiazG3TQI1fB:VyQ/EvqKdpngB7GM6fB
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1