General
-
Target
bdc64d992fa93e7dbd26b1b2a0b4eb614ad7c669a6a2e8c96720dac561ab8872
-
Size
703KB
-
Sample
230824-gccazsad62
-
MD5
6317f42ef644a4d5a0f1503aa4af2f68
-
SHA1
78cf3e8becf9b089445c90331aac220400cffd29
-
SHA256
bdc64d992fa93e7dbd26b1b2a0b4eb614ad7c669a6a2e8c96720dac561ab8872
-
SHA512
aa79fcd9bc758f996ba6753b26bf10913bf9f784f71947b0f9071949e19d7dbf09f6801addc2e7a1d9a5492a5089a0d6cbb9a12dc8c8f6515ce3d24a0fc64da9
-
SSDEEP
12288:rMrDy901Z7rsPyLACAFNbfJ4bp4ThbjBtdeyuXFXZ9KsEvT+2PMQHohr:wy2GyLACaWbwNBbv4FXGs2NPMQHG
Static task
static1
Behavioral task
behavioral1
Sample
bdc64d992fa93e7dbd26b1b2a0b4eb614ad7c669a6a2e8c96720dac561ab8872.exe
Resource
win10-20230703-en
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
rwan
77.91.124.73:19071
-
auth_value
7c40eda5da4f888d6f61befbf947d9fe
Targets
-
-
Target
bdc64d992fa93e7dbd26b1b2a0b4eb614ad7c669a6a2e8c96720dac561ab8872
-
Size
703KB
-
MD5
6317f42ef644a4d5a0f1503aa4af2f68
-
SHA1
78cf3e8becf9b089445c90331aac220400cffd29
-
SHA256
bdc64d992fa93e7dbd26b1b2a0b4eb614ad7c669a6a2e8c96720dac561ab8872
-
SHA512
aa79fcd9bc758f996ba6753b26bf10913bf9f784f71947b0f9071949e19d7dbf09f6801addc2e7a1d9a5492a5089a0d6cbb9a12dc8c8f6515ce3d24a0fc64da9
-
SSDEEP
12288:rMrDy901Z7rsPyLACAFNbfJ4bp4ThbjBtdeyuXFXZ9KsEvT+2PMQHohr:wy2GyLACaWbwNBbv4FXGs2NPMQHG
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1