General
-
Target
6d47f4871dab84b3851c2440cb196c91fd102e38966d01c7602e6a9762c12600
-
Size
555KB
-
Sample
230806-jrcleagd46
-
MD5
23129d62c6880f921d0eb4094d994fb9
-
SHA1
449b943813cde7e11083846062c9ca448ca74239
-
SHA256
6d47f4871dab84b3851c2440cb196c91fd102e38966d01c7602e6a9762c12600
-
SHA512
b3ecd5c0eca0146d39bccaf536054f87aa2ed72e785b80c043061d1e8bf4ad6f47151d7fa23fc238d41ede8626c38badaa14eec8e8792ea512fd9f90bba79049
-
SSDEEP
12288:LMrsy900plfVN+5m3NnvEAgBYCG/VuD5LaZf:PybN+5YncHz4uD54
Static task
static1
Behavioral task
behavioral1
Sample
6d47f4871dab84b3851c2440cb196c91fd102e38966d01c7602e6a9762c12600.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
savin
77.91.124.156:19071
-
auth_value
a1a05b810428195ab7bb63b132ea0c8d
Targets
-
-
Target
6d47f4871dab84b3851c2440cb196c91fd102e38966d01c7602e6a9762c12600
-
Size
555KB
-
MD5
23129d62c6880f921d0eb4094d994fb9
-
SHA1
449b943813cde7e11083846062c9ca448ca74239
-
SHA256
6d47f4871dab84b3851c2440cb196c91fd102e38966d01c7602e6a9762c12600
-
SHA512
b3ecd5c0eca0146d39bccaf536054f87aa2ed72e785b80c043061d1e8bf4ad6f47151d7fa23fc238d41ede8626c38badaa14eec8e8792ea512fd9f90bba79049
-
SSDEEP
12288:LMrsy900plfVN+5m3NnvEAgBYCG/VuD5LaZf:PybN+5YncHz4uD54
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1