General
-
Target
f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe
-
Size
999KB
-
Sample
241119-qmyrea1ndr
-
MD5
6e3bca978c0386e4347d76fe9137ef00
-
SHA1
dc313d7955e71fa3ee00b59c6e6990e7845608b7
-
SHA256
f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191
-
SHA512
6699e506fbd97b533563854111bca723993ed2091fa1a92d9bccba5299c3b8c6c15536676eba721c285f69f4f2fc92f34604ae0c29354076c3c0815c9e8ee6c4
-
SSDEEP
24576:JyTcfGseu430vKB7d1beDvbaMHSsMHxe:8To1eu4kM7rbeyMysE
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
47f88f
http://193.201.9.43
-
install_dir
595f021478
-
install_file
oneetx.exe
-
strings_key
4971eddfd380996ae21bea987102e417
-
url_paths
/plays/chapter/index.php
Targets
-
-
Target
f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe
-
Size
999KB
-
MD5
6e3bca978c0386e4347d76fe9137ef00
-
SHA1
dc313d7955e71fa3ee00b59c6e6990e7845608b7
-
SHA256
f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191
-
SHA512
6699e506fbd97b533563854111bca723993ed2091fa1a92d9bccba5299c3b8c6c15536676eba721c285f69f4f2fc92f34604ae0c29354076c3c0815c9e8ee6c4
-
SSDEEP
24576:JyTcfGseu430vKB7d1beDvbaMHSsMHxe:8To1eu4kM7rbeyMysE
-
Amadey family
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1