General

  • Target

    SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe

  • Size

    930KB

  • Sample

    231014-ea47wage58

  • MD5

    003a5adb39b4aae944fcee366eeecb08

  • SHA1

    34603c966fd5bb29b671275d215db348a66e8ea6

  • SHA256

    c680e5bf89609a2bc8f50217c7bc859fa7d60bdcb53660475bd49e980e2c1e6f

  • SHA512

    d8ebaed7db5a8f2991e88a3c03c0d03137867369b10b9d07fa5dee377424fa9d85b71d3cee02c63a2c73b6737c7b6f1b48309de33dfa429685f3762ad9f47545

  • SSDEEP

    12288:50//yfYb5BIQZVtRXPWfrcojoQkFAaoDUTlJ/Y/ezShebbLAfIoo/d2kgExJkPy9:GiuBtZeraPKengSVL6oJgFbBmW8XBh

Malware Config

Extracted

Family

redline

Botnet

moner

C2

77.91.124.82:19071

Attributes
  • auth_value

    a94cd9e01643e1945b296c28a2f28707

Targets

    • Target

      SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe

    • Size

      930KB

    • MD5

      003a5adb39b4aae944fcee366eeecb08

    • SHA1

      34603c966fd5bb29b671275d215db348a66e8ea6

    • SHA256

      c680e5bf89609a2bc8f50217c7bc859fa7d60bdcb53660475bd49e980e2c1e6f

    • SHA512

      d8ebaed7db5a8f2991e88a3c03c0d03137867369b10b9d07fa5dee377424fa9d85b71d3cee02c63a2c73b6737c7b6f1b48309de33dfa429685f3762ad9f47545

    • SSDEEP

      12288:50//yfYb5BIQZVtRXPWfrcojoQkFAaoDUTlJ/Y/ezShebbLAfIoo/d2kgExJkPy9:GiuBtZeraPKengSVL6oJgFbBmW8XBh

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks