General
-
Target
48b48f6dc2b456a0c906f08be1069079d706d027b4946ade4f40e95ef663772f
-
Size
560KB
-
Sample
230804-sk4kzsbg96
-
MD5
f438ab9f3df7e8f8f314d5a5b73e5b85
-
SHA1
29db129e714a5409bcfc2cbf48b3650aad6d55c5
-
SHA256
48b48f6dc2b456a0c906f08be1069079d706d027b4946ade4f40e95ef663772f
-
SHA512
0babe2e949a0d2014a9a5b83a4299f25ca3900132b22f24553ccbd8c37c6e025a5a9856cc3db051825577bd15d9b8a763a658f005c4d489e89ef69579408afee
-
SSDEEP
12288:TMrEy90/VSjP33/YAajVRf43H3EaUNlttisszTgxL:TyiVSPwA6yHUF/tzsHgF
Static task
static1
Behavioral task
behavioral1
Sample
48b48f6dc2b456a0c906f08be1069079d706d027b4946ade4f40e95ef663772f.exe
Resource
win10-20230703-en
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Targets
-
-
Target
48b48f6dc2b456a0c906f08be1069079d706d027b4946ade4f40e95ef663772f
-
Size
560KB
-
MD5
f438ab9f3df7e8f8f314d5a5b73e5b85
-
SHA1
29db129e714a5409bcfc2cbf48b3650aad6d55c5
-
SHA256
48b48f6dc2b456a0c906f08be1069079d706d027b4946ade4f40e95ef663772f
-
SHA512
0babe2e949a0d2014a9a5b83a4299f25ca3900132b22f24553ccbd8c37c6e025a5a9856cc3db051825577bd15d9b8a763a658f005c4d489e89ef69579408afee
-
SSDEEP
12288:TMrEy90/VSjP33/YAajVRf43H3EaUNlttisszTgxL:TyiVSPwA6yHUF/tzsHgF
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1