General
-
Target
30408787d5bc40e9a269f63e50e46f81.bin
-
Size
687KB
-
Sample
230820-bl5e8sch66
-
MD5
26c3a963db0e551eccc8b90d3e6328ef
-
SHA1
5f703b5c9244e59b6dc5a87a44aa681124b87b12
-
SHA256
f21788f16eded7c544ab50c44e3bd76cb4abc91dd8460956d7d24f72add04dab
-
SHA512
a63796f3ee1657adffdc03f3f465f23c122152af1e4c35717327de4cccd3cebff50ffe68d8c321155667bf60fe13692a6d2951cb01310de33eef25f115afd281
-
SSDEEP
12288:LsE1lwgKYDMmb4CLPVAixmrqSHgEdwL/FvTA4M13fiCYxuX8fQobaHFF0FEeVf0B:LHW4DV9Alzu9vczNYxusYLHFOd06+uAJ
Static task
static1
Behavioral task
behavioral1
Sample
b311eabe9d444ff677324eef2a5851333050015219a08e6099ca15a779e49754.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b311eabe9d444ff677324eef2a5851333050015219a08e6099ca15a779e49754.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Targets
-
-
Target
b311eabe9d444ff677324eef2a5851333050015219a08e6099ca15a779e49754.exe
-
Size
731KB
-
MD5
30408787d5bc40e9a269f63e50e46f81
-
SHA1
d7a6a0104ff7a4041477fcb3e762798e50ebafb4
-
SHA256
b311eabe9d444ff677324eef2a5851333050015219a08e6099ca15a779e49754
-
SHA512
42ea7ba8b39aab4d92ae76e3845cf14eec1005bf004eb8b1ffb94bad0139378bbb9c7ec70a65a083f45759f9410dc6cf3ca8e0b138b482e23abadfb9c6989bf8
-
SSDEEP
12288:MMr/y90K8eUUD21rwCyzi7onc3d6HwYkQEZfyizS9644zMtzXmfzL8twpt0mEEPP:zyD8ckrfyzi7onQ62+9kzMV2rYaHcEPP
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1