General
-
Target
cfa5a380fcbdd817cb4753a185e59403b0a22f31ba8e7c2ce9beb015b37d19e3
-
Size
703KB
-
Sample
230827-dgfbnafb28
-
MD5
90431f0409657a2ee06391eb76573750
-
SHA1
86170db0eec606fe570853ce3f6b4d43ce7ffecb
-
SHA256
cfa5a380fcbdd817cb4753a185e59403b0a22f31ba8e7c2ce9beb015b37d19e3
-
SHA512
aaa28f19516ebd47627167bd0aa0498486def85042d50c89d8210fd676c251f1be34a7bd67f28d0bd02992dea6741b8d645e45574dc7340f56b2f0d4b0b95c1f
-
SSDEEP
12288:dMr7y90Zc6kdO2JZl0tu1vohqOv05l+JBU1LkKX4s2kQOJUnU4Qf5fxVsDxIcnl:6yoc6oO2Dl0tuVDOvC+JBU11X4OVRfmP
Static task
static1
Behavioral task
behavioral1
Sample
cfa5a380fcbdd817cb4753a185e59403b0a22f31ba8e7c2ce9beb015b37d19e3.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Targets
-
-
Target
cfa5a380fcbdd817cb4753a185e59403b0a22f31ba8e7c2ce9beb015b37d19e3
-
Size
703KB
-
MD5
90431f0409657a2ee06391eb76573750
-
SHA1
86170db0eec606fe570853ce3f6b4d43ce7ffecb
-
SHA256
cfa5a380fcbdd817cb4753a185e59403b0a22f31ba8e7c2ce9beb015b37d19e3
-
SHA512
aaa28f19516ebd47627167bd0aa0498486def85042d50c89d8210fd676c251f1be34a7bd67f28d0bd02992dea6741b8d645e45574dc7340f56b2f0d4b0b95c1f
-
SSDEEP
12288:dMr7y90Zc6kdO2JZl0tu1vohqOv05l+JBU1LkKX4s2kQOJUnU4Qf5fxVsDxIcnl:6yoc6oO2Dl0tuVDOvC+JBU11X4OVRfmP
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1