General
-
Target
81381c6e3c2e2dfe4f108bc0d90a70210be8f414990f207311fac0897a5d07da
-
Size
705KB
-
Sample
230831-q5mf4afd38
-
MD5
2947ef6c6866e0bf750d5679cbe1857d
-
SHA1
088aaa3a5cb0721341dfb7d59724f2f99fe46ec9
-
SHA256
81381c6e3c2e2dfe4f108bc0d90a70210be8f414990f207311fac0897a5d07da
-
SHA512
c10151b2ed77b06f788b81c08912f7e7d02536dbd093848d8743c2a8c448a2b2583c2a45e61c1a41842f00e6971dab1b1f55bd1218fac0a3038f6c9b59a7c3ad
-
SSDEEP
12288:+MrBy90QWslw3kiGjkQtiLJwFxjVF7d5s+3k43oPLQ3R5AFKq4Jcx5PBwnXFmaEk:vyUslw3ZGTIont9b4TQB2t4JiJBwnVdD
Static task
static1
Behavioral task
behavioral1
Sample
81381c6e3c2e2dfe4f108bc0d90a70210be8f414990f207311fac0897a5d07da.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Targets
-
-
Target
81381c6e3c2e2dfe4f108bc0d90a70210be8f414990f207311fac0897a5d07da
-
Size
705KB
-
MD5
2947ef6c6866e0bf750d5679cbe1857d
-
SHA1
088aaa3a5cb0721341dfb7d59724f2f99fe46ec9
-
SHA256
81381c6e3c2e2dfe4f108bc0d90a70210be8f414990f207311fac0897a5d07da
-
SHA512
c10151b2ed77b06f788b81c08912f7e7d02536dbd093848d8743c2a8c448a2b2583c2a45e61c1a41842f00e6971dab1b1f55bd1218fac0a3038f6c9b59a7c3ad
-
SSDEEP
12288:+MrBy90QWslw3kiGjkQtiLJwFxjVF7d5s+3k43oPLQ3R5AFKq4Jcx5PBwnXFmaEk:vyUslw3ZGTIont9b4TQB2t4JiJBwnVdD
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1