General
-
Target
cf8e20a486051bcd647acc5269e708deb147088d20f47f0fb9358a368f4f648e
-
Size
556KB
-
Sample
230804-xgw4ysfb5s
-
MD5
5aaa5eb1b474ea2cd68cfc88ae17e0b7
-
SHA1
ef90dccc97fca202fce3529d2c529e70aad69d33
-
SHA256
cf8e20a486051bcd647acc5269e708deb147088d20f47f0fb9358a368f4f648e
-
SHA512
084bf5ff1b1479158116c0ca21f63e3a59d370cbd25f83cdc33af7c1fd5e9f9eae91ce6bda92df1edb7f5a047efc2470eca6236ae649acbcb916554cbb5aa9e6
-
SSDEEP
12288:xMr+y90WRN/vyRi7Nd+7mvWfeGVoXryibfjAad+pE83XZnAG7:vyLy8Bd+GqjVobTjV++cnAG7
Static task
static1
Behavioral task
behavioral1
Sample
cf8e20a486051bcd647acc5269e708deb147088d20f47f0fb9358a368f4f648e.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Targets
-
-
Target
cf8e20a486051bcd647acc5269e708deb147088d20f47f0fb9358a368f4f648e
-
Size
556KB
-
MD5
5aaa5eb1b474ea2cd68cfc88ae17e0b7
-
SHA1
ef90dccc97fca202fce3529d2c529e70aad69d33
-
SHA256
cf8e20a486051bcd647acc5269e708deb147088d20f47f0fb9358a368f4f648e
-
SHA512
084bf5ff1b1479158116c0ca21f63e3a59d370cbd25f83cdc33af7c1fd5e9f9eae91ce6bda92df1edb7f5a047efc2470eca6236ae649acbcb916554cbb5aa9e6
-
SSDEEP
12288:xMr+y90WRN/vyRi7Nd+7mvWfeGVoXryibfjAad+pE83XZnAG7:vyLy8Bd+GqjVobTjV++cnAG7
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1