General
-
Target
95ad7fe3227ba281e358fc4549d1cf5914033fe536e7937397273111470ecc6c
-
Size
556KB
-
Sample
230805-g9we5aag47
-
MD5
0fdb7c6db143d6432d17653623a13c3c
-
SHA1
cd5eee40c95d1fe6f014e67cb5f8fe2ec4f981e8
-
SHA256
95ad7fe3227ba281e358fc4549d1cf5914033fe536e7937397273111470ecc6c
-
SHA512
cecccf3ddc8f4620280bff88a32a4c8005a92598c901837a2a334192ce3f7698f7fd8a7049f04ec07b42d22c19effc45001f073cd3f49f3c81e2cf965a2771e5
-
SSDEEP
12288:UMr1y90tBLWbAIVpEKYxfUUWm/SOuU8KC7vRuKcRkvX7s090R:5yaIVpXYxDSOu3veSvZ0
Static task
static1
Behavioral task
behavioral1
Sample
95ad7fe3227ba281e358fc4549d1cf5914033fe536e7937397273111470ecc6c.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Targets
-
-
Target
95ad7fe3227ba281e358fc4549d1cf5914033fe536e7937397273111470ecc6c
-
Size
556KB
-
MD5
0fdb7c6db143d6432d17653623a13c3c
-
SHA1
cd5eee40c95d1fe6f014e67cb5f8fe2ec4f981e8
-
SHA256
95ad7fe3227ba281e358fc4549d1cf5914033fe536e7937397273111470ecc6c
-
SHA512
cecccf3ddc8f4620280bff88a32a4c8005a92598c901837a2a334192ce3f7698f7fd8a7049f04ec07b42d22c19effc45001f073cd3f49f3c81e2cf965a2771e5
-
SSDEEP
12288:UMr1y90tBLWbAIVpEKYxfUUWm/SOuU8KC7vRuKcRkvX7s090R:5yaIVpXYxDSOu3veSvZ0
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1