General

  • Target

    JC_484c04930748b8872539ca6a55f63d2398981c8d544d4bcef2c1f8d3e6c7fb3b

  • Size

    1.3MB

  • Sample

    231012-srrj1agb6z

  • MD5

    0ced673fcef72c0455d28236c33cad56

  • SHA1

    3abb7ac63bd6801526edcb79b0990409fa7579b5

  • SHA256

    484c04930748b8872539ca6a55f63d2398981c8d544d4bcef2c1f8d3e6c7fb3b

  • SHA512

    ff04fd24c473535287b17b9bb68f5d52e0c1f3c63f581c9d1a2cc45321e11f3c3dee488c9cf206b63a4e1b013394ece72b47aac4cded8632282d1a96eab75d31

  • SSDEEP

    24576:D09M4MPpLiZdSYjS0Lvw5VTfsHorulhbnGkX9cBsQ:D09M4M1qXSyOJfsHtTbH9AsQ

Malware Config

Extracted

Family

redline

Botnet

black

C2

77.91.124.82:19071

Attributes
  • auth_value

    c5887216cebc5a219113738140bc3047

Targets

    • Target

      JC_484c04930748b8872539ca6a55f63d2398981c8d544d4bcef2c1f8d3e6c7fb3b

    • Size

      1.3MB

    • MD5

      0ced673fcef72c0455d28236c33cad56

    • SHA1

      3abb7ac63bd6801526edcb79b0990409fa7579b5

    • SHA256

      484c04930748b8872539ca6a55f63d2398981c8d544d4bcef2c1f8d3e6c7fb3b

    • SHA512

      ff04fd24c473535287b17b9bb68f5d52e0c1f3c63f581c9d1a2cc45321e11f3c3dee488c9cf206b63a4e1b013394ece72b47aac4cded8632282d1a96eab75d31

    • SSDEEP

      24576:D09M4MPpLiZdSYjS0Lvw5VTfsHorulhbnGkX9cBsQ:D09M4M1qXSyOJfsHtTbH9AsQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks