General

  • Target

    a5c7f89f6956e8121ed83c06f5d04d2c5a2f7c470448a3f0b72ed752b2b5cec3

  • Size

    930KB

  • Sample

    230827-hx8elahh4v

  • MD5

    e5adb53381562c13751bc596ca473633

  • SHA1

    3e6981b6e30b9d1dc32073b2adef7c38bb583615

  • SHA256

    a5c7f89f6956e8121ed83c06f5d04d2c5a2f7c470448a3f0b72ed752b2b5cec3

  • SHA512

    f4fed1910cacd0285d406ef664c5c47c095a0ced6c0e1126369f2de5295310e2f870e024c1456981206654027671f8d4ebead8dbcfef728a870fb4755698fc02

  • SSDEEP

    24576:xyuCGPd9z0OYppBp90538PCUlpI8q+7GJQ2T:kuCGPd9zKdH05cDZn7kQ2

Malware Config

Extracted

Family

redline

Botnet

nrava

C2

77.91.124.82:19071

Attributes
  • auth_value

    43fe50e9ee6afb85588e03ac9676e2f7

Targets

    • Target

      a5c7f89f6956e8121ed83c06f5d04d2c5a2f7c470448a3f0b72ed752b2b5cec3

    • Size

      930KB

    • MD5

      e5adb53381562c13751bc596ca473633

    • SHA1

      3e6981b6e30b9d1dc32073b2adef7c38bb583615

    • SHA256

      a5c7f89f6956e8121ed83c06f5d04d2c5a2f7c470448a3f0b72ed752b2b5cec3

    • SHA512

      f4fed1910cacd0285d406ef664c5c47c095a0ced6c0e1126369f2de5295310e2f870e024c1456981206654027671f8d4ebead8dbcfef728a870fb4755698fc02

    • SSDEEP

      24576:xyuCGPd9z0OYppBp90538PCUlpI8q+7GJQ2T:kuCGPd9zKdH05cDZn7kQ2

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks