General
-
Target
d46b5bb279da1a4546e5033c1e897f4b5df0c380aabc287761236ac85ead6eb1
-
Size
730KB
-
Sample
230817-zeg85aeg7v
-
MD5
dd2113347f8eae68837a84da2df28dcc
-
SHA1
e10be5b1b9ef30a0d674d16d1cc11d60fa5ab149
-
SHA256
d46b5bb279da1a4546e5033c1e897f4b5df0c380aabc287761236ac85ead6eb1
-
SHA512
fbdf7a917245555d9c15afa0cd5e810bedf37e7dedf642f4cbf2ea1c47c40185a15812e36e5aea9f05cdb96e283c3c32b60623b7b40a9027b8d1c1f4e4d3f68b
-
SSDEEP
12288:jMrmy90fiYlRPXZDTeiB/FiffZsf8f54bgZmqYMLmZ8M5ErZKZGcU6AsjS2thcUK:ZyGRdJwZskB4bwmqYymfIIMcBAsjDcUK
Static task
static1
Behavioral task
behavioral1
Sample
d46b5bb279da1a4546e5033c1e897f4b5df0c380aabc287761236ac85ead6eb1.exe
Resource
win10-20230703-en
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
maga
77.91.124.54:19071
-
auth_value
9dd7a0be219be9b6228dc9b4e112b812
Targets
-
-
Target
d46b5bb279da1a4546e5033c1e897f4b5df0c380aabc287761236ac85ead6eb1
-
Size
730KB
-
MD5
dd2113347f8eae68837a84da2df28dcc
-
SHA1
e10be5b1b9ef30a0d674d16d1cc11d60fa5ab149
-
SHA256
d46b5bb279da1a4546e5033c1e897f4b5df0c380aabc287761236ac85ead6eb1
-
SHA512
fbdf7a917245555d9c15afa0cd5e810bedf37e7dedf642f4cbf2ea1c47c40185a15812e36e5aea9f05cdb96e283c3c32b60623b7b40a9027b8d1c1f4e4d3f68b
-
SSDEEP
12288:jMrmy90fiYlRPXZDTeiB/FiffZsf8f54bgZmqYMLmZ8M5ErZKZGcU6AsjS2thcUK:ZyGRdJwZskB4bwmqYymfIIMcBAsjDcUK
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1