General
-
Target
023708aac24c82d120dad07cb5ecbb0451d346a778da29c620c488d85491c73d
-
Size
556KB
-
Sample
230807-vys3hsaa9z
-
MD5
91b7acdbe2280ff92756acaf6ab5078e
-
SHA1
07c55160d2a652fdfeb7772e050fc230f002a08e
-
SHA256
023708aac24c82d120dad07cb5ecbb0451d346a778da29c620c488d85491c73d
-
SHA512
e87b65aee382999de52addeca4a0eed1d03952aff4c23300de129a578f3e87a3b039561d65a9cbdf52eef4d7f64e2cd2cadaef669140d44f9aa3dc0b052e6276
-
SSDEEP
12288:5Mruy90LMrQN1vzCbGeQkLxs3557T046xiXt:ryYMkDDe14gk
Static task
static1
Behavioral task
behavioral1
Sample
023708aac24c82d120dad07cb5ecbb0451d346a778da29c620c488d85491c73d.exe
Resource
win10-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
dodge
77.91.124.156:19071
-
auth_value
3372223e987be2a16148c072df30163d
Targets
-
-
Target
023708aac24c82d120dad07cb5ecbb0451d346a778da29c620c488d85491c73d
-
Size
556KB
-
MD5
91b7acdbe2280ff92756acaf6ab5078e
-
SHA1
07c55160d2a652fdfeb7772e050fc230f002a08e
-
SHA256
023708aac24c82d120dad07cb5ecbb0451d346a778da29c620c488d85491c73d
-
SHA512
e87b65aee382999de52addeca4a0eed1d03952aff4c23300de129a578f3e87a3b039561d65a9cbdf52eef4d7f64e2cd2cadaef669140d44f9aa3dc0b052e6276
-
SSDEEP
12288:5Mruy90LMrQN1vzCbGeQkLxs3557T046xiXt:ryYMkDDe14gk
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1