General
-
Target
1e8fb87dcb50d543d474e7f7ffe7c218.exe
-
Size
556KB
-
Sample
230805-ffnyhsha7y
-
MD5
1e8fb87dcb50d543d474e7f7ffe7c218
-
SHA1
bece8f07965b571dc653507d930ca2535f67200d
-
SHA256
bae61ff854b1c75af1816058f9e5393fbfb655879e2c2c9ff502aff248214375
-
SHA512
c00988c190cbe049713521728651b9f7b44550cd2afb70cf43e2d1e9ecabdfd648ee85fb5cbd8899a6b0ab45afa0a59b73fc2879253e772b91cc0d55cd45826a
-
SSDEEP
12288:RMrMy90athOwi032bagoa57xS/FPaTQMPii7+3c:Zyvh2baGfQMP+3c
Static task
static1
Behavioral task
behavioral1
Sample
1e8fb87dcb50d543d474e7f7ffe7c218.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1e8fb87dcb50d543d474e7f7ffe7c218.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Targets
-
-
Target
1e8fb87dcb50d543d474e7f7ffe7c218.exe
-
Size
556KB
-
MD5
1e8fb87dcb50d543d474e7f7ffe7c218
-
SHA1
bece8f07965b571dc653507d930ca2535f67200d
-
SHA256
bae61ff854b1c75af1816058f9e5393fbfb655879e2c2c9ff502aff248214375
-
SHA512
c00988c190cbe049713521728651b9f7b44550cd2afb70cf43e2d1e9ecabdfd648ee85fb5cbd8899a6b0ab45afa0a59b73fc2879253e772b91cc0d55cd45826a
-
SSDEEP
12288:RMrMy90athOwi032bagoa57xS/FPaTQMPii7+3c:Zyvh2baGfQMP+3c
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1