General

  • Target

    afa2c19290c6af1426b388ab2.exe

  • Size

    831KB

  • Sample

    230704-qwqr6afb4s

  • MD5

    afa2c19290c6af1426b388ab25dc14ed

  • SHA1

    6374790f002cbc2775323a5cb8c7d5b6ce0fecbf

  • SHA256

    21ccf26d87af27b9ad7eae8b1d3536495349c1456220122e7deb8924001853a4

  • SHA512

    6fdd68054f5594f5c67736e5a8a0e70040e79e9427bc6871308011ce6955bc9bb6c9db8da2998033c77da19750dc97b0d8785cdcb3b7fd379dbbe41fd424b5c6

  • SSDEEP

    12288:Evi/K7pzFBAR6tnIWavnUE3C8BaPWEetsgy9XyE6PppZ6eN7GGIkVYYTAur9LbJR:L/K1BBQSnm33C8Icszi7PZI1kVPA8PKC

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Targets

    • Target

      afa2c19290c6af1426b388ab2.exe

    • Size

      831KB

    • MD5

      afa2c19290c6af1426b388ab25dc14ed

    • SHA1

      6374790f002cbc2775323a5cb8c7d5b6ce0fecbf

    • SHA256

      21ccf26d87af27b9ad7eae8b1d3536495349c1456220122e7deb8924001853a4

    • SHA512

      6fdd68054f5594f5c67736e5a8a0e70040e79e9427bc6871308011ce6955bc9bb6c9db8da2998033c77da19750dc97b0d8785cdcb3b7fd379dbbe41fd424b5c6

    • SSDEEP

      12288:Evi/K7pzFBAR6tnIWavnUE3C8BaPWEetsgy9XyE6PppZ6eN7GGIkVYYTAur9LbJR:L/K1BBQSnm33C8Icszi7PZI1kVPA8PKC

    • Detects Healer an antivirus disabler dropper

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks