General
-
Target
dc009c3480da5c169ebfc0eac6bd9d8f0fb47097830aebf8a6a2be9a8875ba1a
-
Size
560KB
-
Sample
230805-mqkr6sbf55
-
MD5
4285a06cc8d93b94ab2ce95b12822aeb
-
SHA1
fb1bc329d9312ed8a1089bd4b2ebb8aec52bd7c4
-
SHA256
dc009c3480da5c169ebfc0eac6bd9d8f0fb47097830aebf8a6a2be9a8875ba1a
-
SHA512
4013d7a5e9f304f7fc132446e164bd5d11de3d3672d32f288cb5ae8f0e78050ea928de47a6a9a3f8e71e5008a401c4a632f7ae370ceee3404e82351479874e13
-
SSDEEP
12288:zMrAy900jynCC/NDtYClTUQR+hmftJghyBhwiANH2RKQyp6:/ycnZFttlNkhmfshy3wrHXp6
Static task
static1
Behavioral task
behavioral1
Sample
dc009c3480da5c169ebfc0eac6bd9d8f0fb47097830aebf8a6a2be9a8875ba1a.exe
Resource
win10-20230703-en
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Targets
-
-
Target
dc009c3480da5c169ebfc0eac6bd9d8f0fb47097830aebf8a6a2be9a8875ba1a
-
Size
560KB
-
MD5
4285a06cc8d93b94ab2ce95b12822aeb
-
SHA1
fb1bc329d9312ed8a1089bd4b2ebb8aec52bd7c4
-
SHA256
dc009c3480da5c169ebfc0eac6bd9d8f0fb47097830aebf8a6a2be9a8875ba1a
-
SHA512
4013d7a5e9f304f7fc132446e164bd5d11de3d3672d32f288cb5ae8f0e78050ea928de47a6a9a3f8e71e5008a401c4a632f7ae370ceee3404e82351479874e13
-
SSDEEP
12288:zMrAy900jynCC/NDtYClTUQR+hmftJghyBhwiANH2RKQyp6:/ycnZFttlNkhmfshy3wrHXp6
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1