General

  • Target

    3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd

  • Size

    1.2MB

  • Sample

    231013-fc7lfsgb83

  • MD5

    48696f23706f300c52b22b0f6bf64442

  • SHA1

    c22fae747bbe2750aa0d189bde85889a9dc64c1c

  • SHA256

    3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd

  • SHA512

    debf7e0241a96a9e91c2c22852ebd46a96edf789bd9a1d950df3fee0f13db00b1463e860917b0b2fc35c34dcdd0d1058498d890ad3dbf9717f05c39533147b40

  • SSDEEP

    24576:974cru7u4Ww72pJpu1tZN+uaJVobWLSZLnE0P40VwOCiUaxG:x4cruzf7kTmtPJAoKeZccG

Malware Config

Extracted

Family

redline

Botnet

petin

C2

77.91.124.82:19071

Attributes
  • auth_value

    f6cf7a48c0291d1ef5a3440429827d6d

Targets

    • Target

      3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd

    • Size

      1.2MB

    • MD5

      48696f23706f300c52b22b0f6bf64442

    • SHA1

      c22fae747bbe2750aa0d189bde85889a9dc64c1c

    • SHA256

      3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd

    • SHA512

      debf7e0241a96a9e91c2c22852ebd46a96edf789bd9a1d950df3fee0f13db00b1463e860917b0b2fc35c34dcdd0d1058498d890ad3dbf9717f05c39533147b40

    • SSDEEP

      24576:974cru7u4Ww72pJpu1tZN+uaJVobWLSZLnE0P40VwOCiUaxG:x4cruzf7kTmtPJAoKeZccG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks