General
-
Target
1b3bb65d219a5f1c7a04dad1bb5e762db33ed379c01c34eefe4b16ca4d3c1045exe_JC.exe
-
Size
560KB
-
Sample
230806-lcgmxsaa9t
-
MD5
cef5bfab9df16762711c504c25277cff
-
SHA1
3fc20d7158369c5ac0895998e6ca1be2f9eb5be0
-
SHA256
1b3bb65d219a5f1c7a04dad1bb5e762db33ed379c01c34eefe4b16ca4d3c1045
-
SHA512
50a3e9151d409e3decf3773ad4058c4c6748839f61325d0239fe47dcf2ca7599ebedda1fe2aea5e44ecb7c9dcdb06d7b677487c99be84c785aff6c896d7c5b1a
-
SSDEEP
12288:+MrMy90YHi+OOKKARtytxnwuyJNUivn7zarJ8:uy31ODKqwrTyfUs7z+8
Static task
static1
Behavioral task
behavioral1
Sample
1b3bb65d219a5f1c7a04dad1bb5e762db33ed379c01c34eefe4b16ca4d3c1045exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1b3bb65d219a5f1c7a04dad1bb5e762db33ed379c01c34eefe4b16ca4d3c1045exe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Targets
-
-
Target
1b3bb65d219a5f1c7a04dad1bb5e762db33ed379c01c34eefe4b16ca4d3c1045exe_JC.exe
-
Size
560KB
-
MD5
cef5bfab9df16762711c504c25277cff
-
SHA1
3fc20d7158369c5ac0895998e6ca1be2f9eb5be0
-
SHA256
1b3bb65d219a5f1c7a04dad1bb5e762db33ed379c01c34eefe4b16ca4d3c1045
-
SHA512
50a3e9151d409e3decf3773ad4058c4c6748839f61325d0239fe47dcf2ca7599ebedda1fe2aea5e44ecb7c9dcdb06d7b677487c99be84c785aff6c896d7c5b1a
-
SSDEEP
12288:+MrMy90YHi+OOKKARtytxnwuyJNUivn7zarJ8:uy31ODKqwrTyfUs7z+8
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1