General
-
Target
2a29d43da265a9c49402bcbe5b27cb71.bin
-
Size
688KB
-
Sample
230820-blngqach63
-
MD5
0d6edcfa4eefeba393a56998b340cb33
-
SHA1
d0d992e38ec7ec18034cad63b4465bea20e2361f
-
SHA256
0015a938379d942e4b752bbf32456ca6d8b5c76bc1f5f9f315cbeb8103483fc0
-
SHA512
6dd75fcf90d8c37c1de1404ae749c2708fe06fa72dd4811d583e2b23253946f75bacd07bf2c48da704cf7ff94ac41fdf97e62e8f6ad4adff2e51e7e7d3a3fbbc
-
SSDEEP
12288:DA4UTR37pN57T9ys1KrbWQRaRJN34/d4peaAuS4pwCRt7LVnANN866T/UUI:DAtBtzf5Ke6CJN3YWpnz7wGVo89LUUI
Static task
static1
Behavioral task
behavioral1
Sample
f039548be7cf4a555bae4b9f9a40750a51331b9f6b3599c41bbc5e4a68823b2b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f039548be7cf4a555bae4b9f9a40750a51331b9f6b3599c41bbc5e4a68823b2b.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Targets
-
-
Target
f039548be7cf4a555bae4b9f9a40750a51331b9f6b3599c41bbc5e4a68823b2b.exe
-
Size
732KB
-
MD5
2a29d43da265a9c49402bcbe5b27cb71
-
SHA1
6da6119a0b85e7b8d81d4fbd67221de1d8e01c56
-
SHA256
f039548be7cf4a555bae4b9f9a40750a51331b9f6b3599c41bbc5e4a68823b2b
-
SHA512
b0853b4b0be185f2d79b218743d5a5346b9fc53569bbec5e3c9db35b79870f91c369177cfa0281594c4492b0b573e54b345923e38fd97aba22d8b53ba67bae73
-
SSDEEP
12288:lMrxy90fIk0LjBg19X/PSumobanjTSfwN+N0ZE5pv/ptYPZYaQof/WHYFnK2:8yMSvA9nJbanjOfwN+N0qDv/PYPd/W4/
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1