General
-
Target
EBC4B354D6EC654829F9DE447D0C7B04.exe
-
Size
839KB
-
Sample
240625-vcs6dsvakr
-
MD5
ebc4b354d6ec654829f9de447d0c7b04
-
SHA1
9e5d3ccae0d22bd27f8ae39b2f35b274dabd7fd1
-
SHA256
80923a0d7111b0a1fa4326e3a9a0d9ecb7ce66e276f8672aa79e2b5d99473fab
-
SHA512
1cb3487cf2f1864d22d3148b30ecf70794567af3a84c9ba5f2d16b5dac38017347c4efb92e4978ebfe57588c5883a2ebe4af33e83eaafad99de202548fd0048e
-
SSDEEP
24576:3CIQgVHOEqG7111cZRHVzutBSRhmG5ep:yAH1KL1zwBSRhmAI
Static task
static1
Behavioral task
behavioral1
Sample
EBC4B354D6EC654829F9DE447D0C7B04.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
EBC4B354D6EC654829F9DE447D0C7B04.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xworm
5.0
79.110.49.209:7000
biVc5L0dNUTxuebk
-
install_file
USB.exe
Extracted
redline
X3.0 Foundry
79.110.49.209:37552
Targets
-
-
Target
EBC4B354D6EC654829F9DE447D0C7B04.exe
-
Size
839KB
-
MD5
ebc4b354d6ec654829f9de447d0c7b04
-
SHA1
9e5d3ccae0d22bd27f8ae39b2f35b274dabd7fd1
-
SHA256
80923a0d7111b0a1fa4326e3a9a0d9ecb7ce66e276f8672aa79e2b5d99473fab
-
SHA512
1cb3487cf2f1864d22d3148b30ecf70794567af3a84c9ba5f2d16b5dac38017347c4efb92e4978ebfe57588c5883a2ebe4af33e83eaafad99de202548fd0048e
-
SSDEEP
24576:3CIQgVHOEqG7111cZRHVzutBSRhmG5ep:yAH1KL1zwBSRhmAI
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-