General

  • Target

    782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22

  • Size

    2.6MB

  • Sample

    231012-n55assah99

  • MD5

    417d0554c7f79458682763044a771084

  • SHA1

    31386b623d1c36613dcd48bdc2ab5a1edf19edf4

  • SHA256

    782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22

  • SHA512

    07f21621add8483f9eb3a3d23d5c7c0f5109942c1e07422f0549297fa749f88e9e30f937f67978494de0b6eebc4f16fc0ae74013b5ec8bae30454d969599414b

  • SSDEEP

    49152:T99i4yt//gvNQFuYqXXA/jnalIsazERbh1gd53nHVQgTlUlI2TWrCTnyHBpsJfQ:IpGnMjakzqlS3vTx2+CLyHBpH

Malware Config

Extracted

Family

redline

Botnet

vasha

C2

77.91.124.82:19071

Attributes
  • auth_value

    42fc61786274daca54d589b85a2c1954

Targets

    • Target

      782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22

    • Size

      2.6MB

    • MD5

      417d0554c7f79458682763044a771084

    • SHA1

      31386b623d1c36613dcd48bdc2ab5a1edf19edf4

    • SHA256

      782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22

    • SHA512

      07f21621add8483f9eb3a3d23d5c7c0f5109942c1e07422f0549297fa749f88e9e30f937f67978494de0b6eebc4f16fc0ae74013b5ec8bae30454d969599414b

    • SSDEEP

      49152:T99i4yt//gvNQFuYqXXA/jnalIsazERbh1gd53nHVQgTlUlI2TWrCTnyHBpsJfQ:IpGnMjakzqlS3vTx2+CLyHBpH

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks