General
-
Target
f51a4bd60c3140c5b2dc0e1bb7aaa19b3a34996a972b5f2ff96bcbbbde97f6f9
-
Size
556KB
-
Sample
230804-pvm47sca4s
-
MD5
6c0c2d85b314577a20dff529c6b1ab18
-
SHA1
7ce19083c9667418dccfa32e4393a0dfdcd31588
-
SHA256
f51a4bd60c3140c5b2dc0e1bb7aaa19b3a34996a972b5f2ff96bcbbbde97f6f9
-
SHA512
aa11e9fc068ed909d1be0de877b3067f3369f3c7de6292961bc0749103cb8956f4978c04b4f608988b4db6a1efe35c32e9ed27b363d4fbf4f2d9d808cb50fad6
-
SSDEEP
12288:qMr0y90g2hqLMqYSX0gHk3smc7XYZ9Hh9MgBYCTeWsnyZD4V0TOGh:ayCyYSX0gQ+YZJTzChnoD4VSOGh
Static task
static1
Behavioral task
behavioral1
Sample
f51a4bd60c3140c5b2dc0e1bb7aaa19b3a34996a972b5f2ff96bcbbbde97f6f9.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
noxi
77.91.124.172:19071
-
auth_value
e10200e6555cb5a87e1635876fe8a35a
Targets
-
-
Target
f51a4bd60c3140c5b2dc0e1bb7aaa19b3a34996a972b5f2ff96bcbbbde97f6f9
-
Size
556KB
-
MD5
6c0c2d85b314577a20dff529c6b1ab18
-
SHA1
7ce19083c9667418dccfa32e4393a0dfdcd31588
-
SHA256
f51a4bd60c3140c5b2dc0e1bb7aaa19b3a34996a972b5f2ff96bcbbbde97f6f9
-
SHA512
aa11e9fc068ed909d1be0de877b3067f3369f3c7de6292961bc0749103cb8956f4978c04b4f608988b4db6a1efe35c32e9ed27b363d4fbf4f2d9d808cb50fad6
-
SSDEEP
12288:qMr0y90g2hqLMqYSX0gHk3smc7XYZ9Hh9MgBYCTeWsnyZD4V0TOGh:ayCyYSX0gQ+YZJTzChnoD4VSOGh
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1