General
-
Target
09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf
-
Size
560KB
-
Sample
230804-j7fyrsbc4y
-
MD5
e46bab53bb4baffa59c8bbc9ab486127
-
SHA1
b48aa691eb711a79731e352a8814b32ddbe60d0b
-
SHA256
09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf
-
SHA512
e73a081945efc2c8e6acb07d02a2d2530cef2ed41d64d294385a60b9f7799f56c9f0fa2a3cd41f21b2274d608a97893f34aeb131e84f9250b3b8ce4f0f94a58c
-
SSDEEP
12288:rMrIy906bd94DDVhVC5Z1wpJ0mmycaWi/fh4FKcfT:/yhd94ZyoJ0mmyXWIfh4JT
Static task
static1
Behavioral task
behavioral1
Sample
09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf
-
Size
560KB
-
MD5
e46bab53bb4baffa59c8bbc9ab486127
-
SHA1
b48aa691eb711a79731e352a8814b32ddbe60d0b
-
SHA256
09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf
-
SHA512
e73a081945efc2c8e6acb07d02a2d2530cef2ed41d64d294385a60b9f7799f56c9f0fa2a3cd41f21b2274d608a97893f34aeb131e84f9250b3b8ce4f0f94a58c
-
SSDEEP
12288:rMrIy906bd94DDVhVC5Z1wpJ0mmycaWi/fh4FKcfT:/yhd94ZyoJ0mmyXWIfh4JT
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1