General

  • Target

    40b341b05b69128208203e29665c9a9416f1236003a89b684fc809765e17e88e

  • Size

    830KB

  • Sample

    230902-azrwmaad71

  • MD5

    2b6f566e6dd84066693c1501c5a203f6

  • SHA1

    9dbae32a96ac2a49209777cb5a42e7d09f1085eb

  • SHA256

    40b341b05b69128208203e29665c9a9416f1236003a89b684fc809765e17e88e

  • SHA512

    8e6b513124bdef6b726b4d8d04e4dd2a754dc0cdc598f1473a0684fab177a39ced70784ba9b37e1d368707b1224b70f01ffc6a94a560bdb1d1d22d0e39bc2b46

  • SSDEEP

    12288:jMrry90xKBf5cldHm98Lj/DAJve0uio9Tmi5Hko3NNQTtwVvPlEdO2fq2ARvMM4O:MyATrjbRViWf3NN2twhuMGevwO

Malware Config

Extracted

Family

redline

Botnet

bobik

C2

77.91.124.82:19071

Attributes
  • auth_value

    d639522ae3c9dda998264d691a19eb33

Targets

    • Target

      40b341b05b69128208203e29665c9a9416f1236003a89b684fc809765e17e88e

    • Size

      830KB

    • MD5

      2b6f566e6dd84066693c1501c5a203f6

    • SHA1

      9dbae32a96ac2a49209777cb5a42e7d09f1085eb

    • SHA256

      40b341b05b69128208203e29665c9a9416f1236003a89b684fc809765e17e88e

    • SHA512

      8e6b513124bdef6b726b4d8d04e4dd2a754dc0cdc598f1473a0684fab177a39ced70784ba9b37e1d368707b1224b70f01ffc6a94a560bdb1d1d22d0e39bc2b46

    • SSDEEP

      12288:jMrry90xKBf5cldHm98Lj/DAJve0uio9Tmi5Hko3NNQTtwVvPlEdO2fq2ARvMM4O:MyATrjbRViWf3NN2twhuMGevwO

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks