General
-
Target
9d2fced8ccc776d9ed8e08b574e7bace95f34e3b4aa7709185cedc6dbc7f6446.exe
-
Size
999KB
-
Sample
241118-p67yrasjcj
-
MD5
f459f24536e9b3d9da78dd55a55bd229
-
SHA1
70de98a73d9a8117b736f0a9c4c1785df3d0970a
-
SHA256
9d2fced8ccc776d9ed8e08b574e7bace95f34e3b4aa7709185cedc6dbc7f6446
-
SHA512
1ca7f5c294b0a900652655ac4739a7941f4c47b5082d0e12a7cd60d83f5af2058dfc309978679b1af43528303ce32efdbab94f7e382b2829032a73761949df85
-
SSDEEP
24576:JyTcfGseu430vKB7d1beDvbaMHSsMHxem:8To1eu4kM7rbeyMysEP
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
47f88f
http://193.201.9.43
-
install_dir
595f021478
-
install_file
oneetx.exe
-
strings_key
4971eddfd380996ae21bea987102e417
-
url_paths
/plays/chapter/index.php
Targets
-
-
Target
9d2fced8ccc776d9ed8e08b574e7bace95f34e3b4aa7709185cedc6dbc7f6446.exe
-
Size
999KB
-
MD5
f459f24536e9b3d9da78dd55a55bd229
-
SHA1
70de98a73d9a8117b736f0a9c4c1785df3d0970a
-
SHA256
9d2fced8ccc776d9ed8e08b574e7bace95f34e3b4aa7709185cedc6dbc7f6446
-
SHA512
1ca7f5c294b0a900652655ac4739a7941f4c47b5082d0e12a7cd60d83f5af2058dfc309978679b1af43528303ce32efdbab94f7e382b2829032a73761949df85
-
SSDEEP
24576:JyTcfGseu430vKB7d1beDvbaMHSsMHxem:8To1eu4kM7rbeyMysEP
-
Amadey family
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1