General

  • Target

    f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9

  • Size

    930KB

  • Sample

    230827-njmtmahc63

  • MD5

    69d4b134b45ae8c32164982f0a0a0250

  • SHA1

    a34f7ef8737dbdf249cebe9841ab9db7bb6a1cfa

  • SHA256

    f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9

  • SHA512

    da0c6ea98b396811e7f8969a00a8a167326ff510a6130b6c533965b9f9cce787f1c899b516cad99f0aff05151081bd8aa8894487c66b797da92f71ed86a27e24

  • SSDEEP

    24576:ByCWsJ/fZliIwzPbOXLBGkF7S4YFGDvT73nwY:0CbJ5ot7bObBNF7STEvvw

Malware Config

Extracted

Family

redline

Botnet

nrava

C2

77.91.124.82:19071

Attributes
  • auth_value

    43fe50e9ee6afb85588e03ac9676e2f7

Targets

    • Target

      f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9

    • Size

      930KB

    • MD5

      69d4b134b45ae8c32164982f0a0a0250

    • SHA1

      a34f7ef8737dbdf249cebe9841ab9db7bb6a1cfa

    • SHA256

      f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9

    • SHA512

      da0c6ea98b396811e7f8969a00a8a167326ff510a6130b6c533965b9f9cce787f1c899b516cad99f0aff05151081bd8aa8894487c66b797da92f71ed86a27e24

    • SSDEEP

      24576:ByCWsJ/fZliIwzPbOXLBGkF7S4YFGDvT73nwY:0CbJ5ot7bObBNF7STEvvw

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks