General
-
Target
dec4f81cafb016d353d14d9d6a01b8c5f6be4260da706f10057e0ced653d22e8exe_JC.exe
-
Size
517KB
-
Sample
230813-pa4w8adg7s
-
MD5
6b9d24b2d6d3241fd01e1e0791c31e3c
-
SHA1
a4d88a2ccadc83896b28298bc60dd5787c9d5090
-
SHA256
dec4f81cafb016d353d14d9d6a01b8c5f6be4260da706f10057e0ced653d22e8
-
SHA512
c597a968245844a54cc99395fd5f52cb831ec40fc8f40e3e803bf4ceff4359228856cfee352f83e2acac18ac94690ca68bcab90036e506f36d5973e5abc80219
-
SSDEEP
12288:lMrCy90wQuP+CH8ybRES3S1rNNiKgBYCGh6HSvY:byhjNctS3S16zv
Static task
static1
Behavioral task
behavioral1
Sample
dec4f81cafb016d353d14d9d6a01b8c5f6be4260da706f10057e0ced653d22e8exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
dec4f81cafb016d353d14d9d6a01b8c5f6be4260da706f10057e0ced653d22e8exe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Targets
-
-
Target
dec4f81cafb016d353d14d9d6a01b8c5f6be4260da706f10057e0ced653d22e8exe_JC.exe
-
Size
517KB
-
MD5
6b9d24b2d6d3241fd01e1e0791c31e3c
-
SHA1
a4d88a2ccadc83896b28298bc60dd5787c9d5090
-
SHA256
dec4f81cafb016d353d14d9d6a01b8c5f6be4260da706f10057e0ced653d22e8
-
SHA512
c597a968245844a54cc99395fd5f52cb831ec40fc8f40e3e803bf4ceff4359228856cfee352f83e2acac18ac94690ca68bcab90036e506f36d5973e5abc80219
-
SSDEEP
12288:lMrCy90wQuP+CH8ybRES3S1rNNiKgBYCGh6HSvY:byhjNctS3S16zv
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1