General
-
Target
1948-3256-0x0000000000280000-0x00000000006F6000-memory.dmp
-
Size
4.5MB
-
Sample
241212-p1sxmsvjf1
-
MD5
eec4846c90248ff65d830b524c24c5f5
-
SHA1
67021b1dd3a96f5f79a547cf4aa4ff11dda6c43e
-
SHA256
e2a519a58e753ecf3615db5eea5540543689a8c951fe8de4aa3e3d74b2197a96
-
SHA512
c80eacf3bb09f225b6004ea161341e00eb7bc5b3a7a93c2b15ef333e160513224b0a0dd2d5ebf15d74aa31386c9b6b184898525ac58911e51f8444f5a4c082de
-
SSDEEP
98304:NQ3bSgyY4KJapJenfZmDGXHoCpyJyEptzh8n05QHwV:NQhZnxm3ZRhV5NV
Behavioral task
behavioral1
Sample
1948-3256-0x0000000000280000-0x00000000006F6000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1948-3256-0x0000000000280000-0x00000000006F6000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:8080
101.99.92.189:8080
d5gQ6Zf7Tzih1Pi1
-
install_file
USB.exe
Extracted
redline
1234
kn1vcic.localto.net:7163
Targets
-
-
Target
1948-3256-0x0000000000280000-0x00000000006F6000-memory.dmp
-
Size
4.5MB
-
MD5
eec4846c90248ff65d830b524c24c5f5
-
SHA1
67021b1dd3a96f5f79a547cf4aa4ff11dda6c43e
-
SHA256
e2a519a58e753ecf3615db5eea5540543689a8c951fe8de4aa3e3d74b2197a96
-
SHA512
c80eacf3bb09f225b6004ea161341e00eb7bc5b3a7a93c2b15ef333e160513224b0a0dd2d5ebf15d74aa31386c9b6b184898525ac58911e51f8444f5a4c082de
-
SSDEEP
98304:NQ3bSgyY4KJapJenfZmDGXHoCpyJyEptzh8n05QHwV:NQhZnxm3ZRhV5NV
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-