General
-
Target
7fdb82d291193c25a658d6e8b60d9039e5c7762a47eae634346f9b8fae3e55fe
-
Size
559KB
-
Sample
230803-wjqjhsgc91
-
MD5
00adbc3f05f61ea2124267fe2dec110a
-
SHA1
544e380e394e36a0452815fc2590efac803f93fe
-
SHA256
7fdb82d291193c25a658d6e8b60d9039e5c7762a47eae634346f9b8fae3e55fe
-
SHA512
872ec7c84b547b9ac473a7fa4b86bc2edcbbb70473c4a1d537ffbc20ce3df95158b21d84eb9a96911c2b3b9fc839e07eaac9c625c74fc79636ad8298761771f3
-
SSDEEP
12288:pMray907EgauAhVwI1fw25FsD8yBwdiwMnOeRACGR:DyeaHI25Fxy6d3MuJ
Static task
static1
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
7fdb82d291193c25a658d6e8b60d9039e5c7762a47eae634346f9b8fae3e55fe
-
Size
559KB
-
MD5
00adbc3f05f61ea2124267fe2dec110a
-
SHA1
544e380e394e36a0452815fc2590efac803f93fe
-
SHA256
7fdb82d291193c25a658d6e8b60d9039e5c7762a47eae634346f9b8fae3e55fe
-
SHA512
872ec7c84b547b9ac473a7fa4b86bc2edcbbb70473c4a1d537ffbc20ce3df95158b21d84eb9a96911c2b3b9fc839e07eaac9c625c74fc79636ad8298761771f3
-
SSDEEP
12288:pMray907EgauAhVwI1fw25FsD8yBwdiwMnOeRACGR:DyeaHI25Fxy6d3MuJ
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1