General
-
Target
638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865
-
Size
730KB
-
Sample
230817-3f585aea88
-
MD5
c85763d9f898c78b2e6ee836b8143605
-
SHA1
f3d10f2268ba438e7fb682c1efc10cd5b408e940
-
SHA256
638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865
-
SHA512
773d64caf0f644c5da1494aeef094ab5f4bf96bb4d74e2f8e0d8b4a148be686e145a0dca59e2900f6e307d2908361c0330b20f3f726ea24e9a9c81f3fcbf51c3
-
SSDEEP
12288:1Mr/y907aaUbFqMM4J1xjnxYqmkCrCIskVK5Je74qxKRGWXtp7pUZUzOZrP/:6ypxq94J7LukCrCILWQ74CK4Wv+WzOd3
Static task
static1
Behavioral task
behavioral1
Sample
638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
maga
77.91.124.54:19071
-
auth_value
9dd7a0be219be9b6228dc9b4e112b812
Targets
-
-
Target
638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865
-
Size
730KB
-
MD5
c85763d9f898c78b2e6ee836b8143605
-
SHA1
f3d10f2268ba438e7fb682c1efc10cd5b408e940
-
SHA256
638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865
-
SHA512
773d64caf0f644c5da1494aeef094ab5f4bf96bb4d74e2f8e0d8b4a148be686e145a0dca59e2900f6e307d2908361c0330b20f3f726ea24e9a9c81f3fcbf51c3
-
SSDEEP
12288:1Mr/y907aaUbFqMM4J1xjnxYqmkCrCIskVK5Je74qxKRGWXtp7pUZUzOZrP/:6ypxq94J7LukCrCILWQ74CK4Wv+WzOd3
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1