General

  • Target

    6a78f1986b2318c67f021027b27461c2c34af7bddaa8b8e6177c9eed2daa417d

  • Size

    828KB

  • Sample

    230824-axwf2aac3s

  • MD5

    c3dfef4def94c6eab7d2d8fca0bbf1a8

  • SHA1

    a95041493e8bfa1db7fe76471f7312e5285cb2ad

  • SHA256

    6a78f1986b2318c67f021027b27461c2c34af7bddaa8b8e6177c9eed2daa417d

  • SHA512

    24eff8afb97db8ab80bfebc92d48e0daefd890d38d8d9e9d199081a3fc620875cf0bb829a5aff4b12ee37b1ed95d56a48aff556e121001ff4519be95f2455246

  • SSDEEP

    24576:jyvjqm9grXa1lELDxP0oJz14DVZzPjE3E:22ygrq1ADZZJCPw

Malware Config

Extracted

Family

redline

Botnet

gogi

C2

77.91.124.73:19071

Attributes
  • auth_value

    c7dbabcf1eff128a595c7532cb5489a8

Targets

    • Target

      6a78f1986b2318c67f021027b27461c2c34af7bddaa8b8e6177c9eed2daa417d

    • Size

      828KB

    • MD5

      c3dfef4def94c6eab7d2d8fca0bbf1a8

    • SHA1

      a95041493e8bfa1db7fe76471f7312e5285cb2ad

    • SHA256

      6a78f1986b2318c67f021027b27461c2c34af7bddaa8b8e6177c9eed2daa417d

    • SHA512

      24eff8afb97db8ab80bfebc92d48e0daefd890d38d8d9e9d199081a3fc620875cf0bb829a5aff4b12ee37b1ed95d56a48aff556e121001ff4519be95f2455246

    • SSDEEP

      24576:jyvjqm9grXa1lELDxP0oJz14DVZzPjE3E:22ygrq1ADZZJCPw

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks