General
-
Target
883dac9b806067bd4715ce5eba1c902b268d3ca86a5bdb0238e56635ac9861f3exe_JC.exe
-
Size
517KB
-
Sample
230806-phzx8sbf4x
-
MD5
8f660d10191fa8d19263c5443e88f87e
-
SHA1
046faa43b54409d781767ac048b9f48b825561a8
-
SHA256
883dac9b806067bd4715ce5eba1c902b268d3ca86a5bdb0238e56635ac9861f3
-
SHA512
c02f48908ca67e3ab48701df3738bb931e72dba1f6e5952c4797e62c513943fa3c0751997db561d8566ed74d871b191a8e90dc1c64d6473923fb3a91943648e0
-
SSDEEP
12288:HMrRy90f2POIgZWmEgt3R+3IKigBYCaqN3Od:Kym8nUWmEgtBYLRzzU
Static task
static1
Behavioral task
behavioral1
Sample
883dac9b806067bd4715ce5eba1c902b268d3ca86a5bdb0238e56635ac9861f3exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
883dac9b806067bd4715ce5eba1c902b268d3ca86a5bdb0238e56635ac9861f3exe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Targets
-
-
Target
883dac9b806067bd4715ce5eba1c902b268d3ca86a5bdb0238e56635ac9861f3exe_JC.exe
-
Size
517KB
-
MD5
8f660d10191fa8d19263c5443e88f87e
-
SHA1
046faa43b54409d781767ac048b9f48b825561a8
-
SHA256
883dac9b806067bd4715ce5eba1c902b268d3ca86a5bdb0238e56635ac9861f3
-
SHA512
c02f48908ca67e3ab48701df3738bb931e72dba1f6e5952c4797e62c513943fa3c0751997db561d8566ed74d871b191a8e90dc1c64d6473923fb3a91943648e0
-
SSDEEP
12288:HMrRy90f2POIgZWmEgt3R+3IKigBYCaqN3Od:Kym8nUWmEgtBYLRzzU
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1