General
-
Target
samples.zip
-
Size
473KB
-
Sample
231130-vbj64aeb54
-
MD5
90afb70f10c88ee99535973caa3d928f
-
SHA1
40f0ab3706ac9d76e7467f4fbd787a0860998fa2
-
SHA256
d984ed3b43876f76cbb20355fc2b244e4172bc04669114cb6223994eb8f3d4fa
-
SHA512
17e98be343d8dd06459bd6d2d5d0136b7fcd9df24e457807e87d3d84bcac30e260647a10bb51bce40ab5477b5fb1f5cdf83a69449ff836a455db73eb15abe7d3
-
SSDEEP
12288:Opt0sajgMAGf6+GP9AATwq/5GgjYDY92ophkboF:OptHsfAAvGP9lwfgotophB
Static task
static1
Behavioral task
behavioral1
Sample
00008a59212314c209811cb325cc055a2c197eacd245b5c70b5641d5b635567a.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
amadey
3.86
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
lodka
77.91.124.156:19071
-
auth_value
76f99d6cc9332c02bb9728c3ba80d3a9
Targets
-
-
Target
00008a59212314c209811cb325cc055a2c197eacd245b5c70b5641d5b635567a
-
Size
517KB
-
MD5
2eaad3953f74de005713cb032ea529cd
-
SHA1
44d27d3c677733cacc84fd2cf6ae5e9bf782fe56
-
SHA256
00008a59212314c209811cb325cc055a2c197eacd245b5c70b5641d5b635567a
-
SHA512
dbadd67ace99ef4ffbc3228d1a758253ff3f3dcd3f19e406093db5d73958ba74d90a8364c767b5d71c40929e54d0717730d5c31ce313ba6cc112037d878e1d6d
-
SSDEEP
12288:rMr5y90KIK1GQrpgjNA+F1NmUdoo9x02bTxP70V/u:eyRQK0oo9O69D0tu
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1