General
-
Target
3cee8acea64994e06967a529c5db5d1164fcfeb02100bfd67743be655e913644
-
Size
556KB
-
Sample
230806-degfyaff72
-
MD5
08eb62eb03d90378fe887e2eaf0574ec
-
SHA1
823355250bdc9be3658b508cfa65382621f6b1cd
-
SHA256
3cee8acea64994e06967a529c5db5d1164fcfeb02100bfd67743be655e913644
-
SHA512
a5472a041a8bcb23d87726aea1198c75b19048acc26494d4850ba1a3dc13ef281ade9cdc6d6b411502b4852ac69f6be068a4027c3d28a9d87dd49df953b2c1a7
-
SSDEEP
12288:VMrwy90ovJURyW3a0Y4Ad0Sttu5DCrRGy7nBqK:By7veRRa0Yf0StKDODMK
Static task
static1
Behavioral task
behavioral1
Sample
3cee8acea64994e06967a529c5db5d1164fcfeb02100bfd67743be655e913644.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
savin
77.91.124.156:19071
-
auth_value
a1a05b810428195ab7bb63b132ea0c8d
Targets
-
-
Target
3cee8acea64994e06967a529c5db5d1164fcfeb02100bfd67743be655e913644
-
Size
556KB
-
MD5
08eb62eb03d90378fe887e2eaf0574ec
-
SHA1
823355250bdc9be3658b508cfa65382621f6b1cd
-
SHA256
3cee8acea64994e06967a529c5db5d1164fcfeb02100bfd67743be655e913644
-
SHA512
a5472a041a8bcb23d87726aea1198c75b19048acc26494d4850ba1a3dc13ef281ade9cdc6d6b411502b4852ac69f6be068a4027c3d28a9d87dd49df953b2c1a7
-
SSDEEP
12288:VMrwy90ovJURyW3a0Y4Ad0Sttu5DCrRGy7nBqK:By7veRRa0Yf0StKDODMK
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1