General
-
Target
a7f2116c2d227fab87a24fe50d5aa7aa.bin
-
Size
659KB
-
Sample
230829-chdnsahd56
-
MD5
eab5dc71e24038628c77a003ae2b66f3
-
SHA1
c8cfe1fe1ce9b19c693878b684ae96f73736a9b0
-
SHA256
17cd5b4e95c0cb2a76a917f478b4ba92e7599761e41d32b3ee1cc26d86745823
-
SHA512
52f846ed29d1f6acc6e731f5b718c0cb95f924cee7dbfa3b2d482d9e57bc7bbdf973c9d00977b606c420172c7338820052f5203e98eee86ffc4c0b2e08e15f58
-
SSDEEP
12288:hELU06rTyBDAPlqeQfWsIRBennNZVXVuwxqIM85QYAL/kNkr6C8uzMB/2:FFXyqlIfWsIEnN34w8IM8OYALNAur
Static task
static1
Behavioral task
behavioral1
Sample
cb4df3da40d14958775890bda6f63c2a7e070b22acd8edd14a1a0b16946cfc9e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
cb4df3da40d14958775890bda6f63c2a7e070b22acd8edd14a1a0b16946cfc9e.exe
Resource
win10v2004-20230824-en
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Targets
-
-
Target
cb4df3da40d14958775890bda6f63c2a7e070b22acd8edd14a1a0b16946cfc9e.exe
-
Size
703KB
-
MD5
a7f2116c2d227fab87a24fe50d5aa7aa
-
SHA1
89a29581536f904dd1135eb7030196335edb2df4
-
SHA256
cb4df3da40d14958775890bda6f63c2a7e070b22acd8edd14a1a0b16946cfc9e
-
SHA512
d34dea4d0d60dab7bed240486283032a755cc76b9500fcce83f0e589d14fd76a215011005f011ea2afc2841129201c98b658fe263f960d0e86c392b98d04abe4
-
SSDEEP
12288:uMrzy90UM7dy6Dbjx2pAENUNwkH7aTYVSQPym+nHuCZ6LXsP:Fy+xbdZE4nH7qYcQPmnNEXo
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1