General
-
Target
d8263ca5b091fa827bddb83cf5e2d36d387be0fd07fd52272f755c0f5b312322exe_JC.exe
-
Size
517KB
-
Sample
230812-whnnjadc89
-
MD5
a5ce322ee3b18effb19db35ab6b1224f
-
SHA1
7e5b6cbad3efe9bfeba6b4b1629e6c3fe8f19ee0
-
SHA256
d8263ca5b091fa827bddb83cf5e2d36d387be0fd07fd52272f755c0f5b312322
-
SHA512
c4843016b201644f8ae5f4ce172a071513a3493dad5a4ea02839af910e340b2d2e2bab15c0e6a06390ed27681b25141ea5bdf0b9c15be57cb007ceef90c7e4e0
-
SSDEEP
12288:yMrAy90GcDyNYh1zEfEgv6+QeZW3mM16cgPcv7mFTWx:ay96/5UE6W3kcgU7x
Static task
static1
Behavioral task
behavioral1
Sample
d8263ca5b091fa827bddb83cf5e2d36d387be0fd07fd52272f755c0f5b312322exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d8263ca5b091fa827bddb83cf5e2d36d387be0fd07fd52272f755c0f5b312322exe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Targets
-
-
Target
d8263ca5b091fa827bddb83cf5e2d36d387be0fd07fd52272f755c0f5b312322exe_JC.exe
-
Size
517KB
-
MD5
a5ce322ee3b18effb19db35ab6b1224f
-
SHA1
7e5b6cbad3efe9bfeba6b4b1629e6c3fe8f19ee0
-
SHA256
d8263ca5b091fa827bddb83cf5e2d36d387be0fd07fd52272f755c0f5b312322
-
SHA512
c4843016b201644f8ae5f4ce172a071513a3493dad5a4ea02839af910e340b2d2e2bab15c0e6a06390ed27681b25141ea5bdf0b9c15be57cb007ceef90c7e4e0
-
SSDEEP
12288:yMrAy90GcDyNYh1zEfEgv6+QeZW3mM16cgPcv7mFTWx:ay96/5UE6W3kcgU7x
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1