General
-
Target
847a01e2d216cf23c33dbe2691984b4544db7e06abd43e50b910ef1a46a0f886
-
Size
704KB
-
Sample
230827-rzgt4aac96
-
MD5
f83d67912452959d079e940179ea1209
-
SHA1
0192f28cf5373549ec81ac0fc8be6b94f2694e0c
-
SHA256
847a01e2d216cf23c33dbe2691984b4544db7e06abd43e50b910ef1a46a0f886
-
SHA512
a5ad6449ef615b20067c9c2b698f11016b7b3bd2b2e8e584fd30471cecfb84ec8fc81d3ad2f31902a68bcf6567f7f4a649f1c0656c037dd99317441299eecd77
-
SSDEEP
12288:zMrWy90Y9BGs3PuZjvfxIUFmefuLi8dEfCqhdH0TW0MPks/tVj:ZyRFuZz2wmu6dgCqhZ0S0M8sTj
Static task
static1
Behavioral task
behavioral1
Sample
847a01e2d216cf23c33dbe2691984b4544db7e06abd43e50b910ef1a46a0f886.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Targets
-
-
Target
847a01e2d216cf23c33dbe2691984b4544db7e06abd43e50b910ef1a46a0f886
-
Size
704KB
-
MD5
f83d67912452959d079e940179ea1209
-
SHA1
0192f28cf5373549ec81ac0fc8be6b94f2694e0c
-
SHA256
847a01e2d216cf23c33dbe2691984b4544db7e06abd43e50b910ef1a46a0f886
-
SHA512
a5ad6449ef615b20067c9c2b698f11016b7b3bd2b2e8e584fd30471cecfb84ec8fc81d3ad2f31902a68bcf6567f7f4a649f1c0656c037dd99317441299eecd77
-
SSDEEP
12288:zMrWy90Y9BGs3PuZjvfxIUFmefuLi8dEfCqhdH0TW0MPks/tVj:ZyRFuZz2wmu6dgCqhZ0S0M8sTj
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1