General

  • Target

    385dd617bff2860dcc4b8d2c4e3171821c75fef2eefcba600e25a60fb698e2fe

  • Size

    389KB

  • Sample

    230719-ppgp8sed93

  • MD5

    3ec9ab648eee0ab7bfcbe46e46f2257d

  • SHA1

    2040dfdf8765ab184f1baaf4c0bc5aa11ee712e8

  • SHA256

    385dd617bff2860dcc4b8d2c4e3171821c75fef2eefcba600e25a60fb698e2fe

  • SHA512

    10a6d88e87fc235d655705f2f0d81140852d08fb84bf3bc801bafb37241ebc1c8a48b6ea12ccf8ed4f8a05825856452dc274fe05d877ac3b8132ccd9ad286671

  • SSDEEP

    12288:TMrjy904qFQGZblm5TiTD/kstqnSldwRc:kymmAbkkGc

Malware Config

Extracted

Family

redline

Botnet

nasa

C2

77.91.68.68:19071

Attributes
  • auth_value

    6da71218d8a9738ea3a9a78b5677589b

Targets

    • Target

      385dd617bff2860dcc4b8d2c4e3171821c75fef2eefcba600e25a60fb698e2fe

    • Size

      389KB

    • MD5

      3ec9ab648eee0ab7bfcbe46e46f2257d

    • SHA1

      2040dfdf8765ab184f1baaf4c0bc5aa11ee712e8

    • SHA256

      385dd617bff2860dcc4b8d2c4e3171821c75fef2eefcba600e25a60fb698e2fe

    • SHA512

      10a6d88e87fc235d655705f2f0d81140852d08fb84bf3bc801bafb37241ebc1c8a48b6ea12ccf8ed4f8a05825856452dc274fe05d877ac3b8132ccd9ad286671

    • SSDEEP

      12288:TMrjy904qFQGZblm5TiTD/kstqnSldwRc:kymmAbkkGc

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks