General

  • Target

    c260b272dbb521b35b8c7514dc89931a3938e0e56f1b67e5319a313c404e6beb

  • Size

    931KB

  • Sample

    230831-cmdvcacc93

  • MD5

    5487abada6339f5bee7b877a814f9118

  • SHA1

    68470be7e2319584b8ecb80beb2eb605aff14f89

  • SHA256

    c260b272dbb521b35b8c7514dc89931a3938e0e56f1b67e5319a313c404e6beb

  • SHA512

    cf8db70f8f4c4a9a49d5a02c50e3234965529b7dde05ff56b9f205b926b103c111657cd6dcb6f817892ab6b6147ca02e2171ccc565373af7e40d33865742f971

  • SSDEEP

    24576:myzfoKniGwVrGqMPeMORwRLUmny0C54A/k2i:1z7FwIr2R+Lzny0CqA

Malware Config

Extracted

Family

redline

Botnet

sruta

C2

77.91.124.82:19071

Attributes
  • auth_value

    c556edcd49703319eca74247de20c236

Targets

    • Target

      c260b272dbb521b35b8c7514dc89931a3938e0e56f1b67e5319a313c404e6beb

    • Size

      931KB

    • MD5

      5487abada6339f5bee7b877a814f9118

    • SHA1

      68470be7e2319584b8ecb80beb2eb605aff14f89

    • SHA256

      c260b272dbb521b35b8c7514dc89931a3938e0e56f1b67e5319a313c404e6beb

    • SHA512

      cf8db70f8f4c4a9a49d5a02c50e3234965529b7dde05ff56b9f205b926b103c111657cd6dcb6f817892ab6b6147ca02e2171ccc565373af7e40d33865742f971

    • SSDEEP

      24576:myzfoKniGwVrGqMPeMORwRLUmny0C54A/k2i:1z7FwIr2R+Lzny0CqA

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks