Overview
overview
10Static
static
327efa43e16...c1.exe
windows10-2004-x64
102fd7c050fb...83.exe
windows10-2004-x64
1031714e287a...59.exe
windows10-2004-x64
104663b4277c...a5.exe
windows10-2004-x64
104ef1a0149d...77.exe
windows10-2004-x64
1055de348478...bf.exe
windows10-2004-x64
1062e08aa290...71.exe
windows10-2004-x64
107c2b1a4696...86.exe
windows10-2004-x64
109712f3ca55...1a.exe
windows10-2004-x64
10a2578cb8fe...19.exe
windows10-2004-x64
10a2e15ecbc2...3e.exe
windows10-2004-x64
10bc1039ea1a...c2.exe
windows10-2004-x64
10c7a4524e38...ae.exe
windows10-2004-x64
10f47fb04ed8...65.exe
windows10-2004-x64
10General
-
Target
red1.zip
-
Size
7.3MB
-
Sample
240509-m49nfseb4s
-
MD5
c29a6ae58beff40bba946c5e1a6f0544
-
SHA1
9561b63c41e69ee027d091d6503a72c16a45d900
-
SHA256
82d1eca76037f568efb55ba04db39dbaad07d12a6fe618a601317562ac1dbdfe
-
SHA512
fc0c87f32662b1b05bc4610a902ddb86a64468b993f0b529bbfcd45666cb5967283bce0488edebe5ec5ef118ae6ea6dbf1419e0e1b9cef485917af1b8de12145
-
SSDEEP
196608:acGcJrXf7thSdVgbhJvKPtQViNFlt2B4dbF/dS1OyN3S2FH4Rl:3Gc5v7thSdyDCP+k7K+tHS1OyxS4g
Static task
static1
Behavioral task
behavioral1
Sample
27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2fd7c050fbac5e1af2ffeb7fa80c3d86adca912aa0593a6fcf0ada9f513ba783.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
31714e287ace88f54febd6e8f4714a27d61ad35bc95ab8b019334acebd9cd459.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
4663b4277cecac818e54c11c72e9cf1ad537fe10a266e09ebb9f0026ab9a96a5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
4ef1a0149daef80693bc6f0b8f8337399c8687c08ca4792d24e3bdaab9bf6f77.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
55de348478f00c0877bff6a44118e1b412443ef85c1e45f12245fb8483acb6bf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
62e08aa2909617f096cde8be4d834830bdad6f0907e76c051970413bb9a81571.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7c2b1a4696daa48a0b33a675af61f83d79ca86e3128c3e721bb51e375d18c386.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
9712f3ca55a69dc82a720b41eeb39aa2d2482719c764715d774a1d1d1d11ea1a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
a2578cb8fe72f0748c7fe615457b7d6aaf54e7985f27f459156f659d0937f119.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a2e15ecbc2385dacd7bc1a3a58a295213fdccc9cc1f85d38c2a7ab13a599f33e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
bc1039ea1a02cf1e898c7cea2600cac8f44dbf43b2b49c31da3024ffd998a7c2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
c7a4524e38a070acf6ba7d4865de5125063cd4a021a47872adb720277271f3ae.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
f47fb04ed8077b20b9ca93eddc8ce4a4f05ca4367177fba67c1d87d2831d1865.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
redline
lamp
77.91.68.56:19071
-
auth_value
ee1df63bcdbe3de70f52810d94eaff7d
Extracted
amadey
3.86
http://5.42.92.67
http://77.91.68.61
-
install_dir
ebb444342c
-
install_file
legola.exe
-
strings_key
5680b049188ecacbfa57b1b29c2f35a7
-
url_paths
/norm/index.php
Extracted
redline
lande
77.91.124.84:19071
-
auth_value
9fa41701c47df37786234f3373f21208
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Extracted
amadey
3.85
http://77.91.68.3
-
install_dir
3ec1f323b5
-
install_file
danke.exe
-
strings_key
827021be90f1e85ab27949ea7e9347e8
-
url_paths
/home/love/index.php
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Extracted
redline
masha
77.91.68.48:19071
-
auth_value
55b9b39a0dae383196a4b8d79e5bb805
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Targets
-
-
Target
27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1
-
Size
1.2MB
-
MD5
861cdcff71d268dee3580d2ce333ac09
-
SHA1
94be6d1757a7ab5c0d5ebd464cafb71bc1c5d33d
-
SHA256
27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1
-
SHA512
b2e905338edbaaf101bd94b91c801972ff30f49a8f0f4740c67faa7e8d3c2be243d0883cec424f9db46bbf7b403ae72b5a6e3201d0861093e9084e920a9f1581
-
SSDEEP
24576:ayE5p8ogugja8IT5+YVQ0SVU97kNQ7hDtYT:hwZgja8G5+k79ANQlDtY
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
2fd7c050fbac5e1af2ffeb7fa80c3d86adca912aa0593a6fcf0ada9f513ba783
-
Size
390KB
-
MD5
88cd3287b5c63e0998547f5d6f44ee26
-
SHA1
34ee86ef1950746fb4c38d73de30714f35a49dc9
-
SHA256
2fd7c050fbac5e1af2ffeb7fa80c3d86adca912aa0593a6fcf0ada9f513ba783
-
SHA512
66881b34422644be2eb840992e90f73429d30018aec01c75c349a6041bce6aa279afe71adb404391371a55caad733a907b6cc6f4a9af86b2201bfed9523bd32b
-
SSDEEP
6144:Kuy+bnr+Sp0yN90QEnqLaM6P8is7lQuxVkkm2ptpk9h28:GMray90GJtKuikmAq9k8
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
31714e287ace88f54febd6e8f4714a27d61ad35bc95ab8b019334acebd9cd459
-
Size
390KB
-
MD5
8965f85cd8ceaac637f7ce969b31e87f
-
SHA1
e83a34bca6d34e37cc4652d12d30e994aa9856c7
-
SHA256
31714e287ace88f54febd6e8f4714a27d61ad35bc95ab8b019334acebd9cd459
-
SHA512
795ca8c878ea4eb32e2cba9e01bb1d0d8f31563b910504f1687034c134a4e48e2196b06b5b139ea9408fdf7817377841c6544fdb26bef0a0089340d66c25be5b
-
SSDEEP
12288:vMr5y90TOiPLI6kQHj0rPxqcHnl9va4w5N:iyYrLVDuPx5HTa4wf
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
4663b4277cecac818e54c11c72e9cf1ad537fe10a266e09ebb9f0026ab9a96a5
-
Size
514KB
-
MD5
83901ef0a5b975b100a0dabfb11c7cea
-
SHA1
34a15996b4f2d4bcbdd398658f85eb07e1c90345
-
SHA256
4663b4277cecac818e54c11c72e9cf1ad537fe10a266e09ebb9f0026ab9a96a5
-
SHA512
8bfdc76b1f5abeee4a9043b60adc7992262f980ede10a4ab3c4202f088c4f906aafa70a6da1ec7e729018276d84b8cfe8fff70880bf09488baec63619284893e
-
SSDEEP
12288:rMrXy90YS+RDQE4GGAqO6wSgaqsoCpAPiFT1lg:Ey5SjvGEOJu5g
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
4ef1a0149daef80693bc6f0b8f8337399c8687c08ca4792d24e3bdaab9bf6f77
-
Size
390KB
-
MD5
859f7291df89d775b2c13b9eba46f15e
-
SHA1
cd432f7142d19ca13261a674f4456669fff79c8d
-
SHA256
4ef1a0149daef80693bc6f0b8f8337399c8687c08ca4792d24e3bdaab9bf6f77
-
SHA512
6ffb75ac3d4d5a3cfed9131d46abd4dc0305df6125c5c4e6e926541ee360dfb2e0ed497655873f483089a4154ef5563a691aecb0a5bde83e456e983976411729
-
SSDEEP
6144:KOy+bnr+op0yN90QEJVyucfzJ8b9U+BuekimU0dYTCcHnlRHBd11szcoN:6Mrsy90RcF8b20qUscHnl9T11snN
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
55de348478f00c0877bff6a44118e1b412443ef85c1e45f12245fb8483acb6bf
-
Size
390KB
-
MD5
886cbfdd99e1429ee45e56555632595a
-
SHA1
4e6bf126ffdff44ff512d4dd7a60a410fd53a6c3
-
SHA256
55de348478f00c0877bff6a44118e1b412443ef85c1e45f12245fb8483acb6bf
-
SHA512
3775eee232fb7bd63faf5c10e123652be95db7e66e595114239606ffe91a6be3314d521315035bc5b05a3c5345eb791520409967e9345395221d549c4dd1067d
-
SSDEEP
12288:YMrYy901cQx64cJM44GRgBYCoqZlqW3jN:gymbx2S4j6z5W8N
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
62e08aa2909617f096cde8be4d834830bdad6f0907e76c051970413bb9a81571
-
Size
390KB
-
MD5
89cdfc1ba20fd0bc35bb56ce6c94527f
-
SHA1
8ade187af24b731e949253707b8663fe499b9947
-
SHA256
62e08aa2909617f096cde8be4d834830bdad6f0907e76c051970413bb9a81571
-
SHA512
74dd96290db3afc27d81db8149cfcd28206cb4faf40ff07d49dc9e71c462b2df4e014db345d5a8e954bdbd5c3d40ddcd3676639ac2033563ac02617409ddd4d6
-
SSDEEP
12288:mMrJy90uJ//GRw6QQHnNYZiHW8cHnl9brxi:DyrJWHNHHWjH3w
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
7c2b1a4696daa48a0b33a675af61f83d79ca86e3128c3e721bb51e375d18c386
-
Size
390KB
-
MD5
89c17915df9ce682ef8e12bbde7e8fbb
-
SHA1
2405ab9354eb3a8806d44f481802b56b45e7aaf9
-
SHA256
7c2b1a4696daa48a0b33a675af61f83d79ca86e3128c3e721bb51e375d18c386
-
SHA512
f1caadcd67c105a15c34c795a8b4779c2ac22584e1827a36d41fb7118afd9223dc118f9a44f399936a75c0ef5fef0f0c67467d91b76e65bc77c91bfca5cac896
-
SSDEEP
12288:vMrpy90k2MM9xEhIWgBYCi0xcKxdApCs:myd29Eu1zaKxdAp1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
9712f3ca55a69dc82a720b41eeb39aa2d2482719c764715d774a1d1d1d11ea1a
-
Size
389KB
-
MD5
8db815190d477d5ff3320f63ee0322af
-
SHA1
f20c18ef6555549e9d467d3e63258dd51d561b7c
-
SHA256
9712f3ca55a69dc82a720b41eeb39aa2d2482719c764715d774a1d1d1d11ea1a
-
SHA512
69b513a14c430ab26e06de529b07ab58624fb813c25e2b26db3e62db5255f537765c61c9fb0fcc8413ba3b0bc41d0ec3a593656012f8b4eeb63e398fee3057d8
-
SSDEEP
6144:Kuy+bnr+Hp0yN90QEXnPQvYkWsjZNoBnY6y8byR+cuVsv33+RRSlwlBEfXSm:SMrry90VnPiyY0yR+5Kvn+R8JCm
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
a2578cb8fe72f0748c7fe615457b7d6aaf54e7985f27f459156f659d0937f119
-
Size
922KB
-
MD5
891f1dc06713b9c0c010f03349cc76bb
-
SHA1
b9898973e542acf5172b5fcb94f52111036cfc52
-
SHA256
a2578cb8fe72f0748c7fe615457b7d6aaf54e7985f27f459156f659d0937f119
-
SHA512
bb1495af08880fb6f402d0bc13582ff0d7cda5010127db0c01ad01ef4e018deb273924acc319e917f41666853233e456a2243db6c9ebb3041fb8c4d052b7c234
-
SSDEEP
12288:6Mr7y90xRF1KUynJmZMQ/uYVj62Y75r7qtDA75J6aBOoJe0vPd0NOs2g:pyYXaJmZMQGY62YiuJBBOoJe0vPkug
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
a2e15ecbc2385dacd7bc1a3a58a295213fdccc9cc1f85d38c2a7ab13a599f33e
-
Size
390KB
-
MD5
8dd39449e98f9ea4edf4c974c3e2872f
-
SHA1
63c02fe8b295561277d33792a921ae770ba34afe
-
SHA256
a2e15ecbc2385dacd7bc1a3a58a295213fdccc9cc1f85d38c2a7ab13a599f33e
-
SHA512
86a2995cabfd1d1c202c1663ab2f478eb6716bb10ce728cd65251dc9ad937434754ac42db4f5f0e162e3b51a50499d188029025f03f0e7fc0e29ca9993d332bb
-
SSDEEP
12288:CMray90Yj7GRDUyI9Iztzkdv0u44ENz0Nl:gyv+tU79ACdTP
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
bc1039ea1a02cf1e898c7cea2600cac8f44dbf43b2b49c31da3024ffd998a7c2
-
Size
389KB
-
MD5
8a93f2fead052a76fbae72166ac8fb12
-
SHA1
d3717ab4c59cc8ede584e2ce79bc768d62a03dc3
-
SHA256
bc1039ea1a02cf1e898c7cea2600cac8f44dbf43b2b49c31da3024ffd998a7c2
-
SHA512
cade714bb097b4e24cf985f5156bf55ac4e3390c812055e4e5f10c118e4b2e40d9b449e8b2f236ca9b3095382f884e7f49ce17779362f1cb7a44255c7839711a
-
SSDEEP
6144:KZy+bnr+wp0yN90QE/Yd+B4GwMEbYWOYNdGGxPYuQX/ceXe:fMrIy90TFIYPixAuocj
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
c7a4524e38a070acf6ba7d4865de5125063cd4a021a47872adb720277271f3ae
-
Size
390KB
-
MD5
86270699bad2681bb3f5f57f44a7094e
-
SHA1
cac5e4b620f438ece23b6e9df463b99d2667a95f
-
SHA256
c7a4524e38a070acf6ba7d4865de5125063cd4a021a47872adb720277271f3ae
-
SHA512
92ed35d0f3a0c22d5be759b2cf71064194e440601cba0b848d6a4440467820273b446a38069794da757c2d1c8ae760792a5156e69e4cf5aeaeb003f8ee740443
-
SSDEEP
12288:sMrYy90slB8Ldj5DBLjkSaHAcHnl9kkN6Kw:MyJ8D1lO/Hc
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
f47fb04ed8077b20b9ca93eddc8ce4a4f05ca4367177fba67c1d87d2831d1865
-
Size
1.5MB
-
MD5
85e57bbbfa4b4a93b3389c480fac7189
-
SHA1
bd185ed9b704ae08c0fd652ca05ee3f3cbfccef5
-
SHA256
f47fb04ed8077b20b9ca93eddc8ce4a4f05ca4367177fba67c1d87d2831d1865
-
SHA512
10b7313ed100b1539cf8e4d6caaa996ee8185010d3d475c416b7be8e8f032514605bff766f5210d0921a96a9ad84730bf7583970949c9b62557b42db3d384238
-
SSDEEP
49152:pvUrKe4i6MP4mUJJq5ZuIISIxVa46ecL:W34rMP4fTq5ZuxxVJa
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1