General
-
Target
dfb0ca9f23e57a1a55f29862637457dcf32ff5ab57a3c864ec3e0568a9c03289
-
Size
936KB
-
Sample
230902-2x9r7sga69
-
MD5
bee332984ea559d0fef6c78bb9156e8a
-
SHA1
6283061cad2feb9b46d28e333bae2494067bfcc3
-
SHA256
dfb0ca9f23e57a1a55f29862637457dcf32ff5ab57a3c864ec3e0568a9c03289
-
SHA512
e3d6676d0eb520d5821ebc95283d50552866f8c26f7ad73630850efda675def285be2943f1072478e1e90810bcba2b1faf0587e7fea6cf0c9ad85c6c0de86735
-
SSDEEP
24576:8ydGbPq6ebRIBBkaT/IZuXqngKrYMvkC:ruCdRIBkaTcuXq3
Static task
static1
Behavioral task
behavioral1
Sample
dfb0ca9f23e57a1a55f29862637457dcf32ff5ab57a3c864ec3e0568a9c03289.exe
Resource
win10-20230831-en
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
narik
77.91.124.82:19071
-
auth_value
07924f5ef90576eb64faea857b8ba3e5
Targets
-
-
Target
dfb0ca9f23e57a1a55f29862637457dcf32ff5ab57a3c864ec3e0568a9c03289
-
Size
936KB
-
MD5
bee332984ea559d0fef6c78bb9156e8a
-
SHA1
6283061cad2feb9b46d28e333bae2494067bfcc3
-
SHA256
dfb0ca9f23e57a1a55f29862637457dcf32ff5ab57a3c864ec3e0568a9c03289
-
SHA512
e3d6676d0eb520d5821ebc95283d50552866f8c26f7ad73630850efda675def285be2943f1072478e1e90810bcba2b1faf0587e7fea6cf0c9ad85c6c0de86735
-
SSDEEP
24576:8ydGbPq6ebRIBBkaT/IZuXqngKrYMvkC:ruCdRIBkaTcuXq3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1