General
-
Target
641f3555c3f6c9fc37e076278fb05c87e3c952d305da9f71ee3f132152a0d4c0
-
Size
556KB
-
Sample
230805-k9nxtsbb24
-
MD5
810d42a3471cbb907c7120c2bf03073d
-
SHA1
ca9e9fa378b6e975a055a31b65df09e32f0bb2a9
-
SHA256
641f3555c3f6c9fc37e076278fb05c87e3c952d305da9f71ee3f132152a0d4c0
-
SHA512
72a0ebc2691f42e8949b2c7124c64ca74dac362021e0a870708548bcc9630785461d557b63b4f85095965c4b420f067a163b430b9eb57fcf52a674b10981730e
-
SSDEEP
12288:JMrAy909B0QiuTOucBbOkQmkaRnu+LLjTsDR8n1IYJ:Ny+B5iuiu5kQsbTWYJ
Static task
static1
Behavioral task
behavioral1
Sample
641f3555c3f6c9fc37e076278fb05c87e3c952d305da9f71ee3f132152a0d4c0.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Targets
-
-
Target
641f3555c3f6c9fc37e076278fb05c87e3c952d305da9f71ee3f132152a0d4c0
-
Size
556KB
-
MD5
810d42a3471cbb907c7120c2bf03073d
-
SHA1
ca9e9fa378b6e975a055a31b65df09e32f0bb2a9
-
SHA256
641f3555c3f6c9fc37e076278fb05c87e3c952d305da9f71ee3f132152a0d4c0
-
SHA512
72a0ebc2691f42e8949b2c7124c64ca74dac362021e0a870708548bcc9630785461d557b63b4f85095965c4b420f067a163b430b9eb57fcf52a674b10981730e
-
SSDEEP
12288:JMrAy909B0QiuTOucBbOkQmkaRnu+LLjTsDR8n1IYJ:Ny+B5iuiu5kQsbTWYJ
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1