General

  • Target

    033672b2b74532d7259bd6d4665c7211f11c5774fadb28c73e051a31fda76e99

  • Size

    828KB

  • Sample

    230822-q566haea81

  • MD5

    95d7001ea74c030a925aa7156404230b

  • SHA1

    c2c01a70ddd3ebd9d47cc252a0269c52914031f0

  • SHA256

    033672b2b74532d7259bd6d4665c7211f11c5774fadb28c73e051a31fda76e99

  • SHA512

    008f91bc0cf9d6493cdb14ac6cb655415a6176231150bbff779d07a4a3b9b0c6e59fd6bdf8e3428d598b235f1aadd8f5104f0b12edf1776c78b1f9c35c972bd0

  • SSDEEP

    24576:2yP2IhVl9ZgTE2WI0hib1AVki2pHQcG0:FZpP2WI0hipAj+

Malware Config

Extracted

Family

redline

Botnet

rota

C2

77.91.124.73:19071

Attributes
  • auth_value

    320c7daa59eb9b82e20a15162392a756

Targets

    • Target

      033672b2b74532d7259bd6d4665c7211f11c5774fadb28c73e051a31fda76e99

    • Size

      828KB

    • MD5

      95d7001ea74c030a925aa7156404230b

    • SHA1

      c2c01a70ddd3ebd9d47cc252a0269c52914031f0

    • SHA256

      033672b2b74532d7259bd6d4665c7211f11c5774fadb28c73e051a31fda76e99

    • SHA512

      008f91bc0cf9d6493cdb14ac6cb655415a6176231150bbff779d07a4a3b9b0c6e59fd6bdf8e3428d598b235f1aadd8f5104f0b12edf1776c78b1f9c35c972bd0

    • SSDEEP

      24576:2yP2IhVl9ZgTE2WI0hib1AVki2pHQcG0:FZpP2WI0hipAj+

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks