General
-
Target
33ea9c83fa78c7902708f73a99c21bae8fa29f8fcdc0ef7b80f7c2412a2a381d_JC.exe
-
Size
729KB
-
Sample
230820-sgkcyaga23
-
MD5
d0f7229972c06b92a1723022d1171cb5
-
SHA1
38f4d6ee245244db7675b89210cb3aaba19f6074
-
SHA256
33ea9c83fa78c7902708f73a99c21bae8fa29f8fcdc0ef7b80f7c2412a2a381d
-
SHA512
b7e826fa6161e688e78d7f1e56c5203e655cfdefe04cd83e52518fe1fd460360d54da001aaca9f8b9c2843faba83d215e8c73287dee0c5f1f58da9111f185595
-
SSDEEP
12288:7MrGy90DXc+Ilk6eiQMKwqtTb7TOLMuaIEDgeDKZBe7tQ6KRTiXPp7fJQxfr4FDW:9y2XSC6r111FeDO47t5KVixQ4cWbxS
Static task
static1
Behavioral task
behavioral1
Sample
33ea9c83fa78c7902708f73a99c21bae8fa29f8fcdc0ef7b80f7c2412a2a381d_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
33ea9c83fa78c7902708f73a99c21bae8fa29f8fcdc0ef7b80f7c2412a2a381d_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Targets
-
-
Target
33ea9c83fa78c7902708f73a99c21bae8fa29f8fcdc0ef7b80f7c2412a2a381d_JC.exe
-
Size
729KB
-
MD5
d0f7229972c06b92a1723022d1171cb5
-
SHA1
38f4d6ee245244db7675b89210cb3aaba19f6074
-
SHA256
33ea9c83fa78c7902708f73a99c21bae8fa29f8fcdc0ef7b80f7c2412a2a381d
-
SHA512
b7e826fa6161e688e78d7f1e56c5203e655cfdefe04cd83e52518fe1fd460360d54da001aaca9f8b9c2843faba83d215e8c73287dee0c5f1f58da9111f185595
-
SSDEEP
12288:7MrGy90DXc+Ilk6eiQMKwqtTb7TOLMuaIEDgeDKZBe7tQ6KRTiXPp7fJQxfr4FDW:9y2XSC6r111FeDO47t5KVixQ4cWbxS
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1