General
-
Target
1197af118a4562650b4c7041bab161216eae1060163f97315a40185389d9e77d
-
Size
704KB
-
Sample
230830-ec2jrscf2y
-
MD5
3469e4a2a20f95ff13118ed7a137d76f
-
SHA1
768df65ac2b1d29049073e5e129180656563f03c
-
SHA256
1197af118a4562650b4c7041bab161216eae1060163f97315a40185389d9e77d
-
SHA512
d675057c10432c7434660e954ba6e993590944b324a77d06c0fec924f73e4911cf81c463ee3a22cc8b8bb9928c5cea5e3381a128676ac59cf6e883e0085875f6
-
SSDEEP
12288:RMr/y906MVv4wdOQBOjlVW6uVsxD6PJHhhhW9Qg8zBF16sopov:+yOVtExQmMbhLgCTb1
Static task
static1
Behavioral task
behavioral1
Sample
1197af118a4562650b4c7041bab161216eae1060163f97315a40185389d9e77d.exe
Resource
win10-20230703-en
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Targets
-
-
Target
1197af118a4562650b4c7041bab161216eae1060163f97315a40185389d9e77d
-
Size
704KB
-
MD5
3469e4a2a20f95ff13118ed7a137d76f
-
SHA1
768df65ac2b1d29049073e5e129180656563f03c
-
SHA256
1197af118a4562650b4c7041bab161216eae1060163f97315a40185389d9e77d
-
SHA512
d675057c10432c7434660e954ba6e993590944b324a77d06c0fec924f73e4911cf81c463ee3a22cc8b8bb9928c5cea5e3381a128676ac59cf6e883e0085875f6
-
SSDEEP
12288:RMr/y906MVv4wdOQBOjlVW6uVsxD6PJHhhhW9Qg8zBF16sopov:+yOVtExQmMbhLgCTb1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1