General
-
Target
5d20ad8e9c872f72f83990f13fc7a2b8fdb398163602372993893f2d7be180e6exe_JC.exe
-
Size
556KB
-
Sample
230806-ll4h2sgg58
-
MD5
c899f7859a15a3ef3b778eb507c1d999
-
SHA1
ad18f00a2d7fa6c2b391e87156c41ff2b1a2921a
-
SHA256
5d20ad8e9c872f72f83990f13fc7a2b8fdb398163602372993893f2d7be180e6
-
SHA512
3ecdf408f6285f27b8dde11681dbf397c34df0ad6ab095f9811fd2d9370ee3578f5964147b86337b88597524b8cd7e8fa351027de372b4c69803ca348ce8c3f2
-
SSDEEP
12288:JMrwy90pALi1dwgHRgt+egxwGYZZSxgMpKDME6aa8Z:ZyaALi1ugHlQZZSZE08Z
Static task
static1
Behavioral task
behavioral1
Sample
5d20ad8e9c872f72f83990f13fc7a2b8fdb398163602372993893f2d7be180e6exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5d20ad8e9c872f72f83990f13fc7a2b8fdb398163602372993893f2d7be180e6exe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Targets
-
-
Target
5d20ad8e9c872f72f83990f13fc7a2b8fdb398163602372993893f2d7be180e6exe_JC.exe
-
Size
556KB
-
MD5
c899f7859a15a3ef3b778eb507c1d999
-
SHA1
ad18f00a2d7fa6c2b391e87156c41ff2b1a2921a
-
SHA256
5d20ad8e9c872f72f83990f13fc7a2b8fdb398163602372993893f2d7be180e6
-
SHA512
3ecdf408f6285f27b8dde11681dbf397c34df0ad6ab095f9811fd2d9370ee3578f5964147b86337b88597524b8cd7e8fa351027de372b4c69803ca348ce8c3f2
-
SSDEEP
12288:JMrwy90pALi1dwgHRgt+egxwGYZZSxgMpKDME6aa8Z:ZyaALi1ugHlQZZSZE08Z
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1