General

  • Target

    3b34f9561b8db3fd0d870aca0bf8be19a50218ad061e945f3f37dc8124e805f5

  • Size

    389KB

  • Sample

    230719-hg1d2shb21

  • MD5

    10312fa7c2be164b85cfb75f598c87d3

  • SHA1

    31071e422d3e582946b1001de10a333e5cc1b351

  • SHA256

    3b34f9561b8db3fd0d870aca0bf8be19a50218ad061e945f3f37dc8124e805f5

  • SHA512

    6a5be89cbd74113a8db90f3e37aef59ffd1ec3357745158ae278a07bcd732f608e8664b8cf86e045677f469070fdd9f66042879b6f8608a963347e93c9a2fd65

  • SSDEEP

    6144:K/y+bnr+Rp0yN90QEfiqNBhGkWKjZNUNsJK8VcqzyzhhW8l/4lByZxxwi+:VMrty901iqIB8HzmhW8lwbyrxi

Malware Config

Extracted

Family

redline

Botnet

roma

C2

77.91.68.56:19071

Attributes
  • auth_value

    f099c2cf92834dbc554a94e1456cf576

Targets

    • Target

      3b34f9561b8db3fd0d870aca0bf8be19a50218ad061e945f3f37dc8124e805f5

    • Size

      389KB

    • MD5

      10312fa7c2be164b85cfb75f598c87d3

    • SHA1

      31071e422d3e582946b1001de10a333e5cc1b351

    • SHA256

      3b34f9561b8db3fd0d870aca0bf8be19a50218ad061e945f3f37dc8124e805f5

    • SHA512

      6a5be89cbd74113a8db90f3e37aef59ffd1ec3357745158ae278a07bcd732f608e8664b8cf86e045677f469070fdd9f66042879b6f8608a963347e93c9a2fd65

    • SSDEEP

      6144:K/y+bnr+Rp0yN90QEfiqNBhGkWKjZNUNsJK8VcqzyzhhW8l/4lByZxxwi+:VMrty901iqIB8HzmhW8lwbyrxi

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks