General

  • Target

    5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122

  • Size

    1.3MB

  • Sample

    231012-v34d2sge83

  • MD5

    f2bd5ad22f1f6df41140df8ae2d87952

  • SHA1

    5ae6b29be07edba61b27a882a77ad784e8fcf430

  • SHA256

    5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122

  • SHA512

    b703b5f0bc813c2ad5542f36f450688d1c9b7c18f62cb2f6005da7e10a872aecfbb3a7bc546cc74cd128108272e43867596216e6a96d577bedaff56fa4dab2ec

  • SSDEEP

    24576:g09VQ6COVYcyZmLT2pHvuGKyKgS0THROl5erNIye15OcQ:g09JLGKy200nete1McQ

Malware Config

Extracted

Family

redline

Botnet

black

C2

77.91.124.82:19071

Attributes
  • auth_value

    c5887216cebc5a219113738140bc3047

Targets

    • Target

      5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122

    • Size

      1.3MB

    • MD5

      f2bd5ad22f1f6df41140df8ae2d87952

    • SHA1

      5ae6b29be07edba61b27a882a77ad784e8fcf430

    • SHA256

      5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122

    • SHA512

      b703b5f0bc813c2ad5542f36f450688d1c9b7c18f62cb2f6005da7e10a872aecfbb3a7bc546cc74cd128108272e43867596216e6a96d577bedaff56fa4dab2ec

    • SSDEEP

      24576:g09VQ6COVYcyZmLT2pHvuGKyKgS0THROl5erNIye15OcQ:g09JLGKy200nete1McQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks