General

  • Target

    abb4679b7673b3fc704f66f9d035b3e000988e5cffb458714d71e1422110be1a

  • Size

    824KB

  • Sample

    230902-kchpjsbe6w

  • MD5

    400cffd98f73df288e91270fa8514879

  • SHA1

    f4820a2ede6d1e0b26868d463868a1809a237eba

  • SHA256

    abb4679b7673b3fc704f66f9d035b3e000988e5cffb458714d71e1422110be1a

  • SHA512

    50632be8107ce869df3375b81971d2f07cdacbd985174abca980028c1001bb74b958d26edd3d6a9b129c51fa2e8ccc38f92f548a849bad927a7cff15bb177363

  • SSDEEP

    12288:UMrPy90OdCdv/KtfiElZmY/FAMtXKAC/msR+yJgrurL9WZ3mljMMNuONKI51SwEE:Ly8nO9AG6lcCgru3+e7uONKat

Malware Config

Extracted

Family

redline

Botnet

bobik

C2

77.91.124.82:19071

Attributes
  • auth_value

    d639522ae3c9dda998264d691a19eb33

Targets

    • Target

      abb4679b7673b3fc704f66f9d035b3e000988e5cffb458714d71e1422110be1a

    • Size

      824KB

    • MD5

      400cffd98f73df288e91270fa8514879

    • SHA1

      f4820a2ede6d1e0b26868d463868a1809a237eba

    • SHA256

      abb4679b7673b3fc704f66f9d035b3e000988e5cffb458714d71e1422110be1a

    • SHA512

      50632be8107ce869df3375b81971d2f07cdacbd985174abca980028c1001bb74b958d26edd3d6a9b129c51fa2e8ccc38f92f548a849bad927a7cff15bb177363

    • SSDEEP

      12288:UMrPy90OdCdv/KtfiElZmY/FAMtXKAC/msR+yJgrurL9WZ3mljMMNuONKI51SwEE:Ly8nO9AG6lcCgru3+e7uONKat

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks