General

  • Target

    0b81d51d1e2dae904bdb2f755c6525fe717c7211cc4ff6c12a3cec794203070a

  • Size

    829KB

  • Sample

    230831-lclxmsdh3w

  • MD5

    5dc584de4e4d5a3691088f58c6830835

  • SHA1

    0ae1e1dedcf9f5f7d2f4add3b83f15d5eb0a5dc2

  • SHA256

    0b81d51d1e2dae904bdb2f755c6525fe717c7211cc4ff6c12a3cec794203070a

  • SHA512

    0df4ace99620d3541928f5c24a3846659ce1d4d194103d0a7043ed983af946463c703aed70e4180f194d435d8d18a906dc8c3eb39a1928bdcacdfd18d9281f37

  • SSDEEP

    12288:VMrfy90NSz4tBeykRL9LKgHXcRB1J5sNuoi3+du/HD+58sQc45MPPwDhDy+7/:ayd2LMMjz/K+sQcA4YDh3/

Malware Config

Extracted

Family

redline

Botnet

sruta

C2

77.91.124.82:19071

Attributes
  • auth_value

    c556edcd49703319eca74247de20c236

Targets

    • Target

      0b81d51d1e2dae904bdb2f755c6525fe717c7211cc4ff6c12a3cec794203070a

    • Size

      829KB

    • MD5

      5dc584de4e4d5a3691088f58c6830835

    • SHA1

      0ae1e1dedcf9f5f7d2f4add3b83f15d5eb0a5dc2

    • SHA256

      0b81d51d1e2dae904bdb2f755c6525fe717c7211cc4ff6c12a3cec794203070a

    • SHA512

      0df4ace99620d3541928f5c24a3846659ce1d4d194103d0a7043ed983af946463c703aed70e4180f194d435d8d18a906dc8c3eb39a1928bdcacdfd18d9281f37

    • SSDEEP

      12288:VMrfy90NSz4tBeykRL9LKgHXcRB1J5sNuoi3+du/HD+58sQc45MPPwDhDy+7/:ayd2LMMjz/K+sQcA4YDh3/

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks