General

  • Target

    d6e14897c186139692d984bfdcb8515762483f085ef2d20be5d921653b97f461

  • Size

    564KB

  • Sample

    230817-wfjxkadb5s

  • MD5

    7a60ee7fdde730535f75848f50208b31

  • SHA1

    bfb71cd34c64c94f63981d2ae112973c07645445

  • SHA256

    d6e14897c186139692d984bfdcb8515762483f085ef2d20be5d921653b97f461

  • SHA512

    24a55d819d4015cb5a2261adf3ec72861c540a4b8fbb22d45cc111c7d20239a26f3033443c6b7ad0e40e6e258a10a296c3424b8fc9223087fe8fcec84eae56ce

  • SSDEEP

    12288:2MrPy90SKXIX/eSTI87LOt8kQ84IDau4fvn7RL3:py4XIXJIEOtCMc/7Z

Malware Config

Extracted

Family

redline

Botnet

maga

C2

77.91.124.54:19071

Attributes
  • auth_value

    9dd7a0be219be9b6228dc9b4e112b812

Targets

    • Target

      d6e14897c186139692d984bfdcb8515762483f085ef2d20be5d921653b97f461

    • Size

      564KB

    • MD5

      7a60ee7fdde730535f75848f50208b31

    • SHA1

      bfb71cd34c64c94f63981d2ae112973c07645445

    • SHA256

      d6e14897c186139692d984bfdcb8515762483f085ef2d20be5d921653b97f461

    • SHA512

      24a55d819d4015cb5a2261adf3ec72861c540a4b8fbb22d45cc111c7d20239a26f3033443c6b7ad0e40e6e258a10a296c3424b8fc9223087fe8fcec84eae56ce

    • SSDEEP

      12288:2MrPy90SKXIX/eSTI87LOt8kQ84IDau4fvn7RL3:py4XIXJIEOtCMc/7Z

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks