General

  • Target

    JC_be3fd5d370f9a5df088462db7353b6ff29dbff4659315fdbee02f8a347ad64f0

  • Size

    829KB

  • Sample

    230902-ped7cscg8z

  • MD5

    8eca74547b9551d3b9b817d6fc108230

  • SHA1

    26f68b6214f258e10f7fdb3f5822ea7b9bc623c8

  • SHA256

    be3fd5d370f9a5df088462db7353b6ff29dbff4659315fdbee02f8a347ad64f0

  • SHA512

    6121c5b44555ea099e81f5d90c20b7fd6346f94264605bfbb64f42ceb451dcd2aa7543a65517190ed09bef4daf2f108cfd469ae0dfa28ddee8c71bf7cd75839d

  • SSDEEP

    12288:ZMrxy90XqmFUDK6L9pUstcSc5dYK2wom/1oEDl9GElbL+dH0BH/9Q8nk:0y6vUBp3tHaeKHloqQ0eHq/Q

Malware Config

Extracted

Family

redline

Botnet

bobik

C2

77.91.124.82:19071

Attributes
  • auth_value

    d639522ae3c9dda998264d691a19eb33

Targets

    • Target

      JC_be3fd5d370f9a5df088462db7353b6ff29dbff4659315fdbee02f8a347ad64f0

    • Size

      829KB

    • MD5

      8eca74547b9551d3b9b817d6fc108230

    • SHA1

      26f68b6214f258e10f7fdb3f5822ea7b9bc623c8

    • SHA256

      be3fd5d370f9a5df088462db7353b6ff29dbff4659315fdbee02f8a347ad64f0

    • SHA512

      6121c5b44555ea099e81f5d90c20b7fd6346f94264605bfbb64f42ceb451dcd2aa7543a65517190ed09bef4daf2f108cfd469ae0dfa28ddee8c71bf7cd75839d

    • SSDEEP

      12288:ZMrxy90XqmFUDK6L9pUstcSc5dYK2wom/1oEDl9GElbL+dH0BH/9Q8nk:0y6vUBp3tHaeKHloqQ0eHq/Q

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks