General
-
Target
13875eed229aa615720345fe027475c0_JC.exe
-
Size
390KB
-
Sample
231010-z78xjsbg5z
-
MD5
13875eed229aa615720345fe027475c0
-
SHA1
4a493de4d402b4b2283f0b93ef70627031ca06d6
-
SHA256
c53586f3fc5be3b612dd542f43e9ebc2e08f1d1efec2ee9156acdd23bc356a5d
-
SHA512
8d1fe3b52ac724817cd458bdf320a23234ebda39aeabdddb5deb30d69c7449b7f61f18ecbc7734eba4075404e4747b5890152620d3910d7dd1f6ad46563e2ac3
-
SSDEEP
12288:KMrly90bis+O/pOQqlUx1cS4Zo3gR06L:Xyls+OkK1ytBL
Static task
static1
Behavioral task
behavioral1
Sample
13875eed229aa615720345fe027475c0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
13875eed229aa615720345fe027475c0_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
amadey
3.86
http://77.91.68.61/rock/index.php
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Targets
-
-
Target
13875eed229aa615720345fe027475c0_JC.exe
-
Size
390KB
-
MD5
13875eed229aa615720345fe027475c0
-
SHA1
4a493de4d402b4b2283f0b93ef70627031ca06d6
-
SHA256
c53586f3fc5be3b612dd542f43e9ebc2e08f1d1efec2ee9156acdd23bc356a5d
-
SHA512
8d1fe3b52ac724817cd458bdf320a23234ebda39aeabdddb5deb30d69c7449b7f61f18ecbc7734eba4075404e4747b5890152620d3910d7dd1f6ad46563e2ac3
-
SSDEEP
12288:KMrly90bis+O/pOQqlUx1cS4Zo3gR06L:Xyls+OkK1ytBL
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1