General
-
Target
00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3
-
Size
705KB
-
Sample
250131-mfes6svngj
-
MD5
f67aac6e64021331802841e1ab6a1284
-
SHA1
0e5443344edfba236e919e9f7633051a7dfa1fa4
-
SHA256
00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3
-
SHA512
d592a740b682e0927479c75e0299de623ebce19ab3e837f5f4aedbc863ec469c98878dca9b5f55c8a0e3c5701d74469be0236edc9a3fe35696d78f506428998c
-
SSDEEP
12288:UMrVy90bD0VCvCdg5EBeTy0PdSZc1wxcLPYPVpyddt5i8RUu8684l:Ry6o+0ePBp1wiLPOAtm4l
Static task
static1
Behavioral task
behavioral1
Sample
00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Targets
-
-
Target
00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3
-
Size
705KB
-
MD5
f67aac6e64021331802841e1ab6a1284
-
SHA1
0e5443344edfba236e919e9f7633051a7dfa1fa4
-
SHA256
00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3
-
SHA512
d592a740b682e0927479c75e0299de623ebce19ab3e837f5f4aedbc863ec469c98878dca9b5f55c8a0e3c5701d74469be0236edc9a3fe35696d78f506428998c
-
SSDEEP
12288:UMrVy90bD0VCvCdg5EBeTy0PdSZc1wxcLPYPVpyddt5i8RUu8684l:Ry6o+0ePBp1wiLPOAtm4l
-
Amadey family
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1