General
-
Target
b8915cf0a850a5597f655b9d734b9f19e4aa7f2e17ad22ee4f5bef86d1099a69
-
Size
559KB
-
Sample
230804-hg4fpsba4t
-
MD5
365ce35cfed9e4690fb9a9e0014544ca
-
SHA1
dc1535b00995997eaf873622dab94640c8c0abc1
-
SHA256
b8915cf0a850a5597f655b9d734b9f19e4aa7f2e17ad22ee4f5bef86d1099a69
-
SHA512
15daf6df69395131bc495a2f7bb5986331d3db79c705f9f7072c121f8f1cea0ca1151d67869d9f132df295b5c20f4d38c3920d7eca906d574569b8a6454cb726
-
SSDEEP
12288:VMrsy90ZlseUTuaAzvmvaBaZjFN1RN5tcJiSVxw:ByilseUV+1QNRvqJf+
Static task
static1
Behavioral task
behavioral1
Sample
b8915cf0a850a5597f655b9d734b9f19e4aa7f2e17ad22ee4f5bef86d1099a69.exe
Resource
win10-20230703-en
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
b8915cf0a850a5597f655b9d734b9f19e4aa7f2e17ad22ee4f5bef86d1099a69
-
Size
559KB
-
MD5
365ce35cfed9e4690fb9a9e0014544ca
-
SHA1
dc1535b00995997eaf873622dab94640c8c0abc1
-
SHA256
b8915cf0a850a5597f655b9d734b9f19e4aa7f2e17ad22ee4f5bef86d1099a69
-
SHA512
15daf6df69395131bc495a2f7bb5986331d3db79c705f9f7072c121f8f1cea0ca1151d67869d9f132df295b5c20f4d38c3920d7eca906d574569b8a6454cb726
-
SSDEEP
12288:VMrsy90ZlseUTuaAzvmvaBaZjFN1RN5tcJiSVxw:ByilseUV+1QNRvqJf+
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1