General
-
Target
06691c85eccf9f3b2b1b178b4da8553bf8768d034df42e9a2d7305bad3a9987a
-
Size
560KB
-
Sample
230804-rpkg8scd6v
-
MD5
c909bb2baf1610c8c85caf43daf8d171
-
SHA1
c8554367b1914effb4ac59b94f5ec3e0f65b3e3e
-
SHA256
06691c85eccf9f3b2b1b178b4da8553bf8768d034df42e9a2d7305bad3a9987a
-
SHA512
447f3d295685fe0acebe4b2d1f368f05ea78a2dc74850dc48c1b20f9aa98bbaf4358688e1e41a0b3f523966a892e8984f0927a67f92dacf4aff7e09613a4ebeb
-
SSDEEP
12288:HMryy909rRlwo4tv+DD9zn3oYYcaERxfZiEcnTk39g:dyKRlmB+39zn3U4RBZ0nTkNg
Static task
static1
Behavioral task
behavioral1
Sample
06691c85eccf9f3b2b1b178b4da8553bf8768d034df42e9a2d7305bad3a9987a.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Targets
-
-
Target
06691c85eccf9f3b2b1b178b4da8553bf8768d034df42e9a2d7305bad3a9987a
-
Size
560KB
-
MD5
c909bb2baf1610c8c85caf43daf8d171
-
SHA1
c8554367b1914effb4ac59b94f5ec3e0f65b3e3e
-
SHA256
06691c85eccf9f3b2b1b178b4da8553bf8768d034df42e9a2d7305bad3a9987a
-
SHA512
447f3d295685fe0acebe4b2d1f368f05ea78a2dc74850dc48c1b20f9aa98bbaf4358688e1e41a0b3f523966a892e8984f0927a67f92dacf4aff7e09613a4ebeb
-
SSDEEP
12288:HMryy909rRlwo4tv+DD9zn3oYYcaERxfZiEcnTk39g:dyKRlmB+39zn3U4RBZ0nTkNg
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1