General

  • Target

    c0d7231ffbc7babdddfcb9aa97a0578a41f62c6bb48535b7a24b9cd9af2eb1e0

  • Size

    828KB

  • Sample

    230829-xff2caeg78

  • MD5

    5b0b0b706bd8131260c290fe251ba322

  • SHA1

    41a813471a4b21abb09a3ee9397c090ae2a1c948

  • SHA256

    c0d7231ffbc7babdddfcb9aa97a0578a41f62c6bb48535b7a24b9cd9af2eb1e0

  • SHA512

    9cecfc56896c7d18977db83090641de53cfea794a7bc8cfd8afc115711ba8f8abf693c2fce70d200c56d5a95cd18ff9292bb243af25b50171b0385453be9f2f6

  • SSDEEP

    24576:5ycHlTiorVmSkC8ijwdgi7yzye2p4k6p5/L:scxPryijryeo4r

Malware Config

Extracted

Family

redline

Botnet

sruta

C2

77.91.124.82:19071

Attributes
  • auth_value

    c556edcd49703319eca74247de20c236

Targets

    • Target

      c0d7231ffbc7babdddfcb9aa97a0578a41f62c6bb48535b7a24b9cd9af2eb1e0

    • Size

      828KB

    • MD5

      5b0b0b706bd8131260c290fe251ba322

    • SHA1

      41a813471a4b21abb09a3ee9397c090ae2a1c948

    • SHA256

      c0d7231ffbc7babdddfcb9aa97a0578a41f62c6bb48535b7a24b9cd9af2eb1e0

    • SHA512

      9cecfc56896c7d18977db83090641de53cfea794a7bc8cfd8afc115711ba8f8abf693c2fce70d200c56d5a95cd18ff9292bb243af25b50171b0385453be9f2f6

    • SSDEEP

      24576:5ycHlTiorVmSkC8ijwdgi7yzye2p4k6p5/L:scxPryijryeo4r

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks