General
-
Target
ba5c9d840c93ebc6710e647c2536f2c811d7af83c76d5eda892fe21495932d7bexe_JC.exe
-
Size
517KB
-
Sample
230810-wdr56ahg3v
-
MD5
16d385b1becdbc8e36f5d1d0fd57615f
-
SHA1
fd744f498fdb587a65b48947c62f7e6e1cd6e2aa
-
SHA256
ba5c9d840c93ebc6710e647c2536f2c811d7af83c76d5eda892fe21495932d7b
-
SHA512
d39ea9b235a5618061ade83805fbf0d14ce8462aa3e3ff47687df7632f357f46526b64681b17703d3fe508f0f8fc6e2a1b55c9dacee7f5dc8661fa2f4d7fb7eb
-
SSDEEP
12288:uMrHy90dtJ2zSNyj+Tmq3mC9wH5/bCoeANWG:JyPZj+T9x9E5GY
Static task
static1
Behavioral task
behavioral1
Sample
ba5c9d840c93ebc6710e647c2536f2c811d7af83c76d5eda892fe21495932d7bexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ba5c9d840c93ebc6710e647c2536f2c811d7af83c76d5eda892fe21495932d7bexe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Targets
-
-
Target
ba5c9d840c93ebc6710e647c2536f2c811d7af83c76d5eda892fe21495932d7bexe_JC.exe
-
Size
517KB
-
MD5
16d385b1becdbc8e36f5d1d0fd57615f
-
SHA1
fd744f498fdb587a65b48947c62f7e6e1cd6e2aa
-
SHA256
ba5c9d840c93ebc6710e647c2536f2c811d7af83c76d5eda892fe21495932d7b
-
SHA512
d39ea9b235a5618061ade83805fbf0d14ce8462aa3e3ff47687df7632f357f46526b64681b17703d3fe508f0f8fc6e2a1b55c9dacee7f5dc8661fa2f4d7fb7eb
-
SSDEEP
12288:uMrHy90dtJ2zSNyj+Tmq3mC9wH5/bCoeANWG:JyPZj+T9x9E5GY
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1