General
-
Target
1b60e8288dbbfcadfb99a8effa52f31cec9250269998fd34c10da0b5445752e9
-
Size
705KB
-
Sample
230830-zzmz4sac91
-
MD5
b883ad8155808012472d2b03454ec511
-
SHA1
bdf09e5545c78ee3acd5e0b76e9bda5d9a9f21d1
-
SHA256
1b60e8288dbbfcadfb99a8effa52f31cec9250269998fd34c10da0b5445752e9
-
SHA512
64ea9e10fa5f7743754f1d749d7bf9b0883c6a60bc5302e206483052d666cb4f7af376c018c5c247d4f320f70466c44447a27ced8ff19911d03a5f24f9d768af
-
SSDEEP
12288:hMrHy906atBhWxHaWY9HUBS0rB0Zji26Sc6PYp6NYOJoxMpeqyVvzuuZ/Hm:qyk7XR90HB0ZWe5RNY49n+rB4
Static task
static1
Behavioral task
behavioral1
Sample
1b60e8288dbbfcadfb99a8effa52f31cec9250269998fd34c10da0b5445752e9.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Targets
-
-
Target
1b60e8288dbbfcadfb99a8effa52f31cec9250269998fd34c10da0b5445752e9
-
Size
705KB
-
MD5
b883ad8155808012472d2b03454ec511
-
SHA1
bdf09e5545c78ee3acd5e0b76e9bda5d9a9f21d1
-
SHA256
1b60e8288dbbfcadfb99a8effa52f31cec9250269998fd34c10da0b5445752e9
-
SHA512
64ea9e10fa5f7743754f1d749d7bf9b0883c6a60bc5302e206483052d666cb4f7af376c018c5c247d4f320f70466c44447a27ced8ff19911d03a5f24f9d768af
-
SSDEEP
12288:hMrHy906atBhWxHaWY9HUBS0rB0Zji26Sc6PYp6NYOJoxMpeqyVvzuuZ/Hm:qyk7XR90HB0ZWe5RNY49n+rB4
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1