General
-
Target
f330eeb2d9a5e2c3922ec7500f4ad185ca5e259fd863676648cf138019669dfdN
-
Size
517KB
-
Sample
241020-ayn4cazhqj
-
MD5
6bfbff2a5ccf9e55766c33b4d1cefcf0
-
SHA1
f662f5f77a2f8b26723521b10b789900adcdaf93
-
SHA256
f330eeb2d9a5e2c3922ec7500f4ad185ca5e259fd863676648cf138019669dfd
-
SHA512
5295f88d2a28c60ac3ee6ce964fe5d5c034cdf882870866392dea764feb2b0bcee8065fd6d19a719abf23488610a40c32392e96afdcc7e8281e2348c35022300
-
SSDEEP
12288:PMrUy90FxhVY9j9Mr6j6j0qRSUS1/bwgJse19:by6m9MrrHZ8pLz
Static task
static1
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
f330eeb2d9a5e2c3922ec7500f4ad185ca5e259fd863676648cf138019669dfdN
-
Size
517KB
-
MD5
6bfbff2a5ccf9e55766c33b4d1cefcf0
-
SHA1
f662f5f77a2f8b26723521b10b789900adcdaf93
-
SHA256
f330eeb2d9a5e2c3922ec7500f4ad185ca5e259fd863676648cf138019669dfd
-
SHA512
5295f88d2a28c60ac3ee6ce964fe5d5c034cdf882870866392dea764feb2b0bcee8065fd6d19a719abf23488610a40c32392e96afdcc7e8281e2348c35022300
-
SSDEEP
12288:PMrUy90FxhVY9j9Mr6j6j0qRSUS1/bwgJse19:by6m9MrrHZ8pLz
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1