General
-
Target
996d549b56332fa4af00ccecb68b47aaf63ec2db1e199523ecf638120779f76b
-
Size
103KB
-
Sample
231011-rhtsbscd4w
-
MD5
6401c31a3fc8bceb296de06e37bddba3
-
SHA1
a2febfdda167c1dd23e8e94e049072394dce9154
-
SHA256
a0621c418325443bb35ac32f568769acee45be2c650fe45bea5d4cb50246c89b
-
SHA512
f9e4f8ea8694e0a2a5e1c8e03987988251e55bc9eb01a704d8e645291d12df2acfebd8dcdef631a603d51a51d579e3cbb0550611f435f40e21917c4a08687f19
-
SSDEEP
3072:vLTzrHEDjomznpCacXyS+ZLRyy401G6JPb:vLXmD8hX8ZNyqG6Bb
Behavioral task
behavioral1
Sample
996d549b56332fa4af00ccecb68b47aaf63ec2db1e199523ecf638120779f76b.exe
Resource
win7-20230831-en
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
breha
77.91.124.55:19071
Targets
-
-
Target
996d549b56332fa4af00ccecb68b47aaf63ec2db1e199523ecf638120779f76b
-
Size
239KB
-
MD5
8225efe7d368280f7ea6f2c0a34dd153
-
SHA1
76ab50a26df49fc5f99c43f7d91766e5576c7930
-
SHA256
996d549b56332fa4af00ccecb68b47aaf63ec2db1e199523ecf638120779f76b
-
SHA512
a4571196fba4472b55116ef5a340303b1d2376651ccbc75885b0d085fdc757c1157f93ffecfda704834641bb5979a19b3a0dae62ea2c2b848d653aa34848d214
-
SSDEEP
6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1