General
-
Target
b2716b1996e4e011070367fce3d313207b416b50e78002dca6bc337168ec5cf3
-
Size
560KB
-
Sample
230804-wy7fkseh6z
-
MD5
f4ce7783ace821ba40748a92a6939d05
-
SHA1
99e619efb47e14aab6976c72d2bfa0abf0a4587e
-
SHA256
b2716b1996e4e011070367fce3d313207b416b50e78002dca6bc337168ec5cf3
-
SHA512
9ecabad063a41079c6db3033e8c60cec48fb9854f2295a650dbc2c4541359e44474f8b6e5f21358d9b86d157933fc6bfafd7f89a100ab1e1e8a21c3186cb67c2
-
SSDEEP
12288:rMrzy90fvzxnD/TQFEz2yT/ginFNH1pv:4yEzxDUEz2ybgWFh1pv
Static task
static1
Behavioral task
behavioral1
Sample
b2716b1996e4e011070367fce3d313207b416b50e78002dca6bc337168ec5cf3.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Targets
-
-
Target
b2716b1996e4e011070367fce3d313207b416b50e78002dca6bc337168ec5cf3
-
Size
560KB
-
MD5
f4ce7783ace821ba40748a92a6939d05
-
SHA1
99e619efb47e14aab6976c72d2bfa0abf0a4587e
-
SHA256
b2716b1996e4e011070367fce3d313207b416b50e78002dca6bc337168ec5cf3
-
SHA512
9ecabad063a41079c6db3033e8c60cec48fb9854f2295a650dbc2c4541359e44474f8b6e5f21358d9b86d157933fc6bfafd7f89a100ab1e1e8a21c3186cb67c2
-
SSDEEP
12288:rMrzy90fvzxnD/TQFEz2yT/ginFNH1pv:4yEzxDUEz2ybgWFh1pv
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1