General
-
Target
9f6d7ce0a4c1ab34486296e45356ece44b96d8a488095b494215e224f4358596
-
Size
704KB
-
Sample
230831-fhhjhscf6z
-
MD5
e62193ca839cefcee785e230f205bcc0
-
SHA1
83c0f782b9fdfbf900477d56afc101ff8248b75a
-
SHA256
9f6d7ce0a4c1ab34486296e45356ece44b96d8a488095b494215e224f4358596
-
SHA512
19ab824df4fd4b938bdaec023b219dc136ae151d37172c1e64d2d3d0936692d7807f02d1d31275ea812999b9d6262f7972365a93ee4bb8a20323b90357caa01c
-
SSDEEP
12288:6Mrry90vgHqr51RGBHgq50QYyHo0f4dIltnRxKBI2smWymjOCI8:ZyDaXCH3elylrlhRaIvmWfjOH8
Static task
static1
Behavioral task
behavioral1
Sample
9f6d7ce0a4c1ab34486296e45356ece44b96d8a488095b494215e224f4358596.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Targets
-
-
Target
9f6d7ce0a4c1ab34486296e45356ece44b96d8a488095b494215e224f4358596
-
Size
704KB
-
MD5
e62193ca839cefcee785e230f205bcc0
-
SHA1
83c0f782b9fdfbf900477d56afc101ff8248b75a
-
SHA256
9f6d7ce0a4c1ab34486296e45356ece44b96d8a488095b494215e224f4358596
-
SHA512
19ab824df4fd4b938bdaec023b219dc136ae151d37172c1e64d2d3d0936692d7807f02d1d31275ea812999b9d6262f7972365a93ee4bb8a20323b90357caa01c
-
SSDEEP
12288:6Mrry90vgHqr51RGBHgq50QYyHo0f4dIltnRxKBI2smWymjOCI8:ZyDaXCH3elylrlhRaIvmWfjOH8
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1