General
-
Target
3c3ec77006c0c8dd3aa72eaae43db9bb6a2231c21828ab91c29952cf53cd1b2e
-
Size
680KB
-
Sample
230804-fzdlwshf86
-
MD5
4792c787cfafabca94a91b0eaba1b83f
-
SHA1
02071f20cd878bae1479e2fc88c1352c482e2091
-
SHA256
3c3ec77006c0c8dd3aa72eaae43db9bb6a2231c21828ab91c29952cf53cd1b2e
-
SHA512
b1f3204095c2ece1a12aa5aaf541d38d09ec9e614049331f7a9d3b5344fe44675de304eafc0a02cf936be6c1dbda58366b17fc5a2257851a6673533fe86e648e
-
SSDEEP
12288:3Mray90KzwF3uAO3nqhxb7BX8YVNICrkMnFeRKiHWKNXNs0M4e:hyLIeAGq7vd8ILrdnUnbMf
Static task
static1
Behavioral task
behavioral1
Sample
3c3ec77006c0c8dd3aa72eaae43db9bb6a2231c21828ab91c29952cf53cd1b2e.exe
Resource
win10-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
3c3ec77006c0c8dd3aa72eaae43db9bb6a2231c21828ab91c29952cf53cd1b2e
-
Size
680KB
-
MD5
4792c787cfafabca94a91b0eaba1b83f
-
SHA1
02071f20cd878bae1479e2fc88c1352c482e2091
-
SHA256
3c3ec77006c0c8dd3aa72eaae43db9bb6a2231c21828ab91c29952cf53cd1b2e
-
SHA512
b1f3204095c2ece1a12aa5aaf541d38d09ec9e614049331f7a9d3b5344fe44675de304eafc0a02cf936be6c1dbda58366b17fc5a2257851a6673533fe86e648e
-
SSDEEP
12288:3Mray90KzwF3uAO3nqhxb7BX8YVNICrkMnFeRKiHWKNXNs0M4e:hyLIeAGq7vd8ILrdnUnbMf
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1