Overview
overview
10Static
static
30e13a10fd6...cb.exe
windows10-2004-x64
101d089addfe...b5.exe
windows10-2004-x64
1035d50aca92...42.exe
windows10-2004-x64
103ab23a3036...c6.exe
windows10-2004-x64
1058ac39bbc6...9e.exe
windows10-2004-x64
1064792ffeec...35.exe
windows10-2004-x64
10654aa4d5e8...3b.exe
windows10-2004-x64
10677afbc183...fd.exe
windows7-x64
3677afbc183...fd.exe
windows10-2004-x64
1071d1420ff1...80.exe
windows10-2004-x64
107a08e2a624...2b.exe
windows10-2004-x64
108c7a2623ea...7d.exe
windows10-2004-x64
10c64d3873d4...2e.exe
windows10-2004-x64
10cbd8058875...48.exe
windows7-x64
3cbd8058875...48.exe
windows10-2004-x64
10ec20c35511...9b.exe
windows10-2004-x64
10eca60134d9...3f.exe
windows10-2004-x64
10ecc005f21f...de.exe
windows10-2004-x64
f0fb625894...03.exe
windows10-2004-x64
10f66a0103e4...71.exe
windows10-2004-x64
10ffa14d4c0b...02.exe
windows10-2004-x64
10General
-
Target
red.zip
-
Size
9.6MB
-
Sample
240510-rkj1xaac4t
-
MD5
d61b3dde7b9f8821f9e9310dd9a6725b
-
SHA1
3e09483c22528f79504bbc42afccc6c2f1d2c334
-
SHA256
efe008ef2d2f134b3dc13b0e7774cf5afaac37652f491658b45665e175cf12b9
-
SHA512
bb3c79065b5fb4996a113d814ac2d946252b31022628086dd131582ef953906ab007a08e32f8ba1c94eb950bd3e5869895c2551805142d4a74a09fd30b2c3deb
-
SSDEEP
196608:w3KiL4p6YPYtkF4ePhaKqUhbQHxUgkXZTZF5DrlEaQwyYlrvFqUPbf1m:nFgYPTFFPTNGrkXRjJrlVzyYl7pT9m
Static task
static1
Behavioral task
behavioral1
Sample
0e13a10fd67a47892e598c6953856fd7786d3e7b1f70c519cae5cfe6b7ce37cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
35d50aca923965e5a644e1735c8cd657d562282a8fddd8a654982c84f9258342.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3ab23a30366cb3cfeded88ccba1999ff26ead2bcde69af9aad7e2ed1fa054cc6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
58ac39bbc629fc59614b3b5578967a587814d2de70f8a9cba5090cdfbbfb469e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
64792ffeeccbab6bb3d100eb7b35cb61c8c90b802e42d83350baf6d1ceefbb35.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
654aa4d5e8d49043a4c5b40ef9c1b2fde8bd371386fd43ed6b7c1d719f41533b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
71d1420ff1b7b7e37d536b943d3ba7e0a2fa5972fce4156cbbc73c7416d49d80.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7a08e2a624c497b3986fed503c84dd39612ab1fdda740280e5a1514c1aac802b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
8c7a2623ea0bfbad72a17add57243068958fa7289cd1319d5cbc3af84eeac07d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
c64d3873d4dbf74d0c6e28f27a09adb2a8c897e218d1a4a4f5822391bf80c92e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
cbd8058875fbf90f6f6a3c6825fab01a2bac4ffb1903f2a0405d451060ea1a48.exe
Resource
win7-20231129-en
Behavioral task
behavioral15
Sample
cbd8058875fbf90f6f6a3c6825fab01a2bac4ffb1903f2a0405d451060ea1a48.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ec20c355119abdb18d4433dc95969146db3a558e4e316a175b184ea42d45f89b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
eca60134d922b4bca2cb5060841b6d45581f33e04f763a9c118fc9f22e289e3f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ecc005f21f15aefcf4a4280bfeddf37e7a9066e1fede069eb10a19bfaf62dade.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f0fb625894c32db0094ce88fe51ad9ddb2db188124af7a638cf184eccf3d1203.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f66a0103e4528b09122b55cb248c3007154afc26e699fa5ddf5d3f200e810a71.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ffa14d4c0be8bc789970a81ab0d1c4ceb689e261224f173a8dbd9609a9b45102.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
amadey
3.85
http://77.91.68.3
-
install_dir
3ec1f323b5
-
install_file
danke.exe
-
strings_key
827021be90f1e85ab27949ea7e9347e8
-
url_paths
/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Extracted
amadey
3.86
http://5.42.92.67
http://77.91.68.61
-
install_dir
ebb444342c
-
install_file
legola.exe
-
strings_key
5680b049188ecacbfa57b1b29c2f35a7
-
url_paths
/norm/index.php
Extracted
redline
lande
77.91.124.84:19071
-
auth_value
9fa41701c47df37786234f3373f21208
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Extracted
redline
lamp
77.91.68.56:19071
-
auth_value
ee1df63bcdbe3de70f52810d94eaff7d
Extracted
redline
5195552529
https://pastebin.com/raw/NgsUAPya
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Extracted
redline
kira
77.91.68.48:19071
-
auth_value
1677a40fd8997eb89377e1681911e9c6
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Extracted
redline
krast
77.91.68.68:19071
-
auth_value
9059ea331e4599de3746df73ccb24514
Targets
-
-
Target
0e13a10fd67a47892e598c6953856fd7786d3e7b1f70c519cae5cfe6b7ce37cb
-
Size
515KB
-
MD5
3e4e8d216a0d15843b0aec01c987bd3c
-
SHA1
f97fd9bdafbc200bfb0fc0831ba2f467f292e5b5
-
SHA256
0e13a10fd67a47892e598c6953856fd7786d3e7b1f70c519cae5cfe6b7ce37cb
-
SHA512
ae797941b8f5e7cf81093a47b49c043c3e22b6df6cfeb4f11d6a484c43aaefb59c913763024b54bd9955e38c84549b75854de1e248080b6a669e95ed56b096ef
-
SSDEEP
12288:RMrRy90hbABebqT7LJ525DJbwwIHlNkeI9UhJGT:cyEwGqG5Dl8FNWe2
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5
-
Size
307KB
-
MD5
406420c14aa174852320d385d123709e
-
SHA1
7d024d2fa2371bafadc17f0f0b6f99e27066f96a
-
SHA256
1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5
-
SHA512
854da09f5d7affd56b0053dee765ae569ddb42cdbb80b5290bf1671630b9e0e938b04e5a26c04ba9cd7f4721918eaa487858497bdd241417d92339b6a938a859
-
SSDEEP
6144:KPy+bnr+rp0yN90QEg5F5OYc1u31g4TByzpGJqadn6ffBCe:BMrDy90Gxc1u31TTEN0Z56f8e
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
35d50aca923965e5a644e1735c8cd657d562282a8fddd8a654982c84f9258342
-
Size
389KB
-
MD5
3e8e3f99da17defbcc54d0b92d42d370
-
SHA1
4ae4d190f1c7743e707ade02bc452627b85df598
-
SHA256
35d50aca923965e5a644e1735c8cd657d562282a8fddd8a654982c84f9258342
-
SHA512
b395d1d18633eae61c9133b42803cac788fe2e636bf2d930e6d5b19b227b64c9c04bb748d440b7664a011626b03ac9e80b284442f63ba3d4948bf3a4ff4e9165
-
SSDEEP
12288:iMrEy9080eKh/MtcyzhXhwB2GdnXxxEpyFpp:qyUe5tFtRjUkIFpp
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
3ab23a30366cb3cfeded88ccba1999ff26ead2bcde69af9aad7e2ed1fa054cc6
-
Size
857KB
-
MD5
0f0d0b0d1763725ce36c1c1db736fc8e
-
SHA1
3a5d36a40ae2f0aa832b88db12e8080f83b8503d
-
SHA256
3ab23a30366cb3cfeded88ccba1999ff26ead2bcde69af9aad7e2ed1fa054cc6
-
SHA512
224c93c379f47a4b1886478c26427daab891b4cdbbacf2dbdce454a8d3acc1c16eda545ff2381cbfe0fb872fe670060471f346986f7fc6ae4007039531322f5d
-
SSDEEP
24576:nyD97B7U1CjyvR3id1Z0Fr4m5lO5x99+wfCbnBYsVj:yDaCjcipq5lO5X9+wqbGK
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
58ac39bbc629fc59614b3b5578967a587814d2de70f8a9cba5090cdfbbfb469e
-
Size
359KB
-
MD5
0f48c5af86633f921e293f8dfaeb4ba6
-
SHA1
9432c35040d8c06cbce9bf056a7a2db4fdfc5331
-
SHA256
58ac39bbc629fc59614b3b5578967a587814d2de70f8a9cba5090cdfbbfb469e
-
SHA512
0062073a20deba2a262cf2f270be098888588abda012c0dbea18f60801efb912a467887e967700f9f901e82021fc4db30ac77aea4bd043349ca363c18bfc3d44
-
SSDEEP
6144:Kqy+bnr+cp0yN90QE8k1UgFRQpsnz9PUITrnHvOfwz/FYT:iMrMy90CpgFRGspfTjIwz/Fi
-
Detects Healer an antivirus disabler dropper
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
64792ffeeccbab6bb3d100eb7b35cb61c8c90b802e42d83350baf6d1ceefbb35
-
Size
390KB
-
MD5
0f8598fb85f2093ef6d50320bb154ef9
-
SHA1
2c59e4a20dfbf7509be558e6d23a13b885643055
-
SHA256
64792ffeeccbab6bb3d100eb7b35cb61c8c90b802e42d83350baf6d1ceefbb35
-
SHA512
4f02ce78063742780afd98688b40d764f5d27b5cc3877c13ab3a616a2d2b92fbbd800bb64548d43f7b58970cbce83143fb75ba2682c2de3bfaa0db19a9c28b75
-
SSDEEP
6144:K7y+bnr+mp0yN90QEkE/euW+jgZlHyZgSKaFSJV1MA3lm7ZP1bj40:NMriy90GxufjgvyZtKOSJxabj5
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
654aa4d5e8d49043a4c5b40ef9c1b2fde8bd371386fd43ed6b7c1d719f41533b
-
Size
515KB
-
MD5
105d5754387cc3a3140ccc8660c1e50f
-
SHA1
8dbb756c10678900b0e33893e81976f82ca0b8b5
-
SHA256
654aa4d5e8d49043a4c5b40ef9c1b2fde8bd371386fd43ed6b7c1d719f41533b
-
SHA512
538caa75dbcbd33065587c29e6ce0bcbf51eddc8ce50ce8b6684381e4ee0d9bb8c603669afc0272c7e8efd614c7ae87a0d78fe1b3a284006d193389c98243e62
-
SSDEEP
12288:bMrzy90w4dJ/YUR/O0OI/gbs/YYsDYHHlhctsY6Zqztn7Q6ip2:gyV4DHR/VO+/YDknlCtf6ZaV7Q6iM
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd
-
Size
467KB
-
MD5
3ef1aae1590eb138e6444db02fd3c1c1
-
SHA1
d8906538be380eecb256132a5a87682d8b14e254
-
SHA256
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd
-
SHA512
9146ebe581ffa7bae67a8bf74969e8144c4d059c3409d75a20b40771b8d6511f9ec5c49a2a0664646798d6b21094d3b8b5cb8ae4992d3a03e5c6bfa34c27d694
-
SSDEEP
12288:iZZE67b6ybYwz3EtKooU0EpPSnGkOaPVDOQSFv3uMyL98F:6G6/bYvt10EpPSGkOaPoMRZu
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
-
-
Target
71d1420ff1b7b7e37d536b943d3ba7e0a2fa5972fce4156cbbc73c7416d49d80
-
Size
390KB
-
MD5
0f6e9123147c19f2467905401e618e1b
-
SHA1
917abbb6f211d4a7662c8f05947e799452691601
-
SHA256
71d1420ff1b7b7e37d536b943d3ba7e0a2fa5972fce4156cbbc73c7416d49d80
-
SHA512
151241129262e3de028e744556aa0ae408c5b469996892abd32ddd41dc86bc2a0e496e4bf2ed07c6a8cadff7643e3f0bc9b501eff36dd2b4a90b7ffef1e67e1f
-
SSDEEP
6144:Kvy+bnr+Kp0yN90QEH1EEZn+h2FJ3GVHY+M0NoAsjLSTJHAcihT9/2U8sC2dQ:RMruy90cETW4YdJHnihTcU9BdQ
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
7a08e2a624c497b3986fed503c84dd39612ab1fdda740280e5a1514c1aac802b
-
Size
514KB
-
MD5
0fa62ebed394e0d1ca75a047dfcd8883
-
SHA1
c320dd1803bf38cd5822882b9c3aed0c0d2df000
-
SHA256
7a08e2a624c497b3986fed503c84dd39612ab1fdda740280e5a1514c1aac802b
-
SHA512
d36d9c9ce7042ca5942ec1a762e109c21a717057b6895b8d1b74892c6b08ff7b017c7142012685eb2112ac6800344910e8f2086980887641717db5a20fb437da
-
SSDEEP
12288:VMrNy90LyyzBA8YCgPxn4VxjSadSX9zheZnSW:cykXgPaSadSX9tmnSW
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
8c7a2623ea0bfbad72a17add57243068958fa7289cd1319d5cbc3af84eeac07d
-
Size
925KB
-
MD5
3e90b5f8e46ec833c865faa7b4d1bc60
-
SHA1
28f893f8c74afb560f3d58113176a6417d561fbe
-
SHA256
8c7a2623ea0bfbad72a17add57243068958fa7289cd1319d5cbc3af84eeac07d
-
SHA512
caeea27ce211e797c65de526a4a1d597f00117f0f6a64755a433142f9425e85672ae86cac7d71fb7f8c2ee9b38af3766b669c513e54ab279508e9f8f212f78ad
-
SSDEEP
24576:zySEW8KZohbEF0cN+j+EQJBBenV9CSEsVTrPhc:G1WLZohi+jvQJBULCPsZrP
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
c64d3873d4dbf74d0c6e28f27a09adb2a8c897e218d1a4a4f5822391bf80c92e
-
Size
390KB
-
MD5
3e0e0e6d1b148a974f44ed81e76b4daa
-
SHA1
6e500bf32412d5f02b5994e016a1c3ee577a1f9b
-
SHA256
c64d3873d4dbf74d0c6e28f27a09adb2a8c897e218d1a4a4f5822391bf80c92e
-
SHA512
2cd132b1d0adabf219069588447a1ba17492b0b362b47e6668fd09543f71a9d18a974497dcc077af549d243984ace87b4cafa74c9feb55cae31a8dac7964533d
-
SSDEEP
6144:KNy+bnr+Yp0yN90QEtdzHtFJ+5AnfcYNRAdFnD8AVDQ1NWXy//Sm7kk5nrKA/t:zMrAy90ZHLmGEFI3+y//sk5nrKAl
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
cbd8058875fbf90f6f6a3c6825fab01a2bac4ffb1903f2a0405d451060ea1a48
-
Size
983KB
-
MD5
0f5dcf244539e44929a29fdc2bee6cf0
-
SHA1
d12c4a1527a6910e0f45e5d61c3f0f027cd65892
-
SHA256
cbd8058875fbf90f6f6a3c6825fab01a2bac4ffb1903f2a0405d451060ea1a48
-
SHA512
34b382df4ab8246c87c8a49acf7f37b33ed252c75b94fe47db7699ad20906abbd42b58ce953a5547da064b5fe93c38eab8d64299f85f99706cb8154af039a0fa
-
SSDEEP
12288:dN53wXdk+4w8ea9YVhYu48bkEXjTvrVbJWekouloWnxfKuXl/DeeQA:dN5edk+4wv+YVhYu4rCTvhFanR3XlCm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
-
-
Target
ec20c355119abdb18d4433dc95969146db3a558e4e316a175b184ea42d45f89b
-
Size
481KB
-
MD5
3fb94d2cd967f1b24a98a7793682109d
-
SHA1
084c6ae94fd17bf205f394cc3c868bbae8bded84
-
SHA256
ec20c355119abdb18d4433dc95969146db3a558e4e316a175b184ea42d45f89b
-
SHA512
92b3e81fa7440c493fe681ac4e60f9a0756eede0400b9bc003f7f89222f4b8106ac71ac938fa4b75616d0b8b11169b1a037205e89a1c1f1031046227da26db72
-
SSDEEP
12288:FMrHy90xhkX5GOiNlHVPPZXaudS9iKus:Cyqs4vRNaud8ids
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
eca60134d922b4bca2cb5060841b6d45581f33e04f763a9c118fc9f22e289e3f
-
Size
856KB
-
MD5
102cc57cf59a9b99f5615c58ba8ae4a2
-
SHA1
0e92c89813cae891a354a5feea121b2aad6d77ab
-
SHA256
eca60134d922b4bca2cb5060841b6d45581f33e04f763a9c118fc9f22e289e3f
-
SHA512
7d1cab053e2b8aa3b66f866f3beff4241c85fc9d17ee6b1f7b8b1c6964b7aca133cf2ae080feb91e0b82f304d45f2556d88e072274bf17bb7cc479d3744c2409
-
SSDEEP
12288:6MrMy90GsPfX7+uwEvNGQdJ6HpKFKeVNxsZMQDkbQFUoSCfd07Cw:+yqL+ubvUQyHkFKaxsZZugRw
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
ecc005f21f15aefcf4a4280bfeddf37e7a9066e1fede069eb10a19bfaf62dade
-
Size
1.2MB
-
MD5
108da43ca546ecda525fb9192e48bbab
-
SHA1
89e854990351e39312d835f972d5dd26c83e90cf
-
SHA256
ecc005f21f15aefcf4a4280bfeddf37e7a9066e1fede069eb10a19bfaf62dade
-
SHA512
47927611bcecf322864a8e6c62e43c284d7cfffe67b07096db04d3933ebd08484b4b8e25586721ed5313f24f0bfe3ff872cf7a76b6a7c98efd3db0f240a14dcf
-
SSDEEP
24576:6ysB4DrCYYGq1BnTNaz6/usrdYu2GGriw+qx2u+ZXp9eS8Nts3TM:Bs4CjBnTNazeu8dT2nRx1+n8Nts3Y
Score1/10 -
-
-
Target
f0fb625894c32db0094ce88fe51ad9ddb2db188124af7a638cf184eccf3d1203
-
Size
389KB
-
MD5
10d90091ef4d583803f960e642111708
-
SHA1
9a36e16049aca4f664c3802003afa15637326ccc
-
SHA256
f0fb625894c32db0094ce88fe51ad9ddb2db188124af7a638cf184eccf3d1203
-
SHA512
01891a9da02ab953a654f96bc927df089e11c28dff9983277621cffe463da5ff3a888992daea3f1f82d68fa1ec21ea6502c6ea4ceeb0495b3a13d813b438bd2c
-
SSDEEP
6144:K/y+bnr+5p0yN90QEwBYGFRxbEZcRaEHIpj1XH8bbvymQmiaKq9REG8dq2:pMrpy90LUIZ1EHEBisG8dF
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
f66a0103e4528b09122b55cb248c3007154afc26e699fa5ddf5d3f200e810a71
-
Size
857KB
-
MD5
10d9e523ef3fa325767733e9b06a5183
-
SHA1
ce932310c4e2ff5db5c2c78b90f69ad2270c08b2
-
SHA256
f66a0103e4528b09122b55cb248c3007154afc26e699fa5ddf5d3f200e810a71
-
SHA512
9c319dacf140286345b160ca481dfe68466db1f028fa3f823d5ad8c7aacce5ed2d1218bbb226a103870004bfe7c845d7396fe851e4142f2cdc877e47fed2cf8e
-
SSDEEP
12288:uMr5y90hl0vLfgTNcWAs5+X7YQaeB42ilLYj18fbo+efG40s+6OuUFLV3sBempko:Hy+0zqxA3LvmSj6jo+A0GUFh3Rm6aj
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
ffa14d4c0be8bc789970a81ab0d1c4ceb689e261224f173a8dbd9609a9b45102
-
Size
359KB
-
MD5
3e6c4929a82b142d398d5b1a60a93857
-
SHA1
478ba0a29fcab3a9674f20c5b28f66a0fcc53795
-
SHA256
ffa14d4c0be8bc789970a81ab0d1c4ceb689e261224f173a8dbd9609a9b45102
-
SHA512
3e292fdc2d2f52d9942fc732e66c4dbc50656a22b758c7e67377077d8461d0c18170cb50634d07d199957bb5cb5e728c7fa5ed9c5c71018b17945e184e5714e4
-
SSDEEP
6144:K1y+bnr+op0yN90QEdx1i6EoKZ8J+gY4OUsKOK/Apfn6l+ZMFIPXewY:XMrIy90nMUzOUsKOK4p9PpY
-
Detects Healer an antivirus disabler dropper
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1