General
-
Target
682c0a009c4faf7b44abc9cb74701016e84e5b8c4f2f6c1a8706a6daa0b310b2
-
Size
704KB
-
Sample
230827-j2ztpaac3v
-
MD5
67f3fae4267b7510ba60377ac38c6d2e
-
SHA1
151ddbc3fe39e1bd26aef61abb41145953a5b302
-
SHA256
682c0a009c4faf7b44abc9cb74701016e84e5b8c4f2f6c1a8706a6daa0b310b2
-
SHA512
b2881524a7b2f842ff2f6fc700a7d76fea1fb479dbfbc892d6a1c4d7f9b11501f95921c83e34b540054bc09b0ab916ee0490de0bfe828163bf8fdbea652b5bbd
-
SSDEEP
12288:sMrRy90aOs0mREdz7M024HCd2cwWdITh/rLivstbNOH0XrlAM:ly/Os0mUHMhbd2eITh/rHpNKolAM
Static task
static1
Behavioral task
behavioral1
Sample
682c0a009c4faf7b44abc9cb74701016e84e5b8c4f2f6c1a8706a6daa0b310b2.exe
Resource
win10v2004-20230824-en
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Targets
-
-
Target
682c0a009c4faf7b44abc9cb74701016e84e5b8c4f2f6c1a8706a6daa0b310b2
-
Size
704KB
-
MD5
67f3fae4267b7510ba60377ac38c6d2e
-
SHA1
151ddbc3fe39e1bd26aef61abb41145953a5b302
-
SHA256
682c0a009c4faf7b44abc9cb74701016e84e5b8c4f2f6c1a8706a6daa0b310b2
-
SHA512
b2881524a7b2f842ff2f6fc700a7d76fea1fb479dbfbc892d6a1c4d7f9b11501f95921c83e34b540054bc09b0ab916ee0490de0bfe828163bf8fdbea652b5bbd
-
SSDEEP
12288:sMrRy90aOs0mREdz7M024HCd2cwWdITh/rLivstbNOH0XrlAM:ly/Os0mUHMhbd2eITh/rHpNKolAM
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1