General

  • Target

    a994918b082806da67e3873503edffd92500c5821949cc73368fb8be25bf2155

  • Size

    3.1MB

  • Sample

    231014-a2jb9shh24

  • MD5

    2855392cec4f8929f43dfdee1304c984

  • SHA1

    07046d28bae2268a8e2608880b2b12010dc9ff60

  • SHA256

    a994918b082806da67e3873503edffd92500c5821949cc73368fb8be25bf2155

  • SHA512

    13689f5c4d6ea8c8d44259d3cbb942e2fe96b0a8520ec11da029e71a021f3619d83eeb2d79c2de1f20e5edf423fb1515e25c2affe32bd8e7520eeaf4c2d830a2

  • SSDEEP

    49152:8sSnXgA9x4vsraFn6a3vtvE5iFHIf/tB4INwvxWIx9hQXxHCy:8sSn0s98AiB+NYsH

Malware Config

Extracted

Family

redline

Botnet

ramon

C2

77.91.124.82:19071

Attributes
  • auth_value

    3197576965d9513f115338c233015b40

Targets

    • Target

      a994918b082806da67e3873503edffd92500c5821949cc73368fb8be25bf2155

    • Size

      3.1MB

    • MD5

      2855392cec4f8929f43dfdee1304c984

    • SHA1

      07046d28bae2268a8e2608880b2b12010dc9ff60

    • SHA256

      a994918b082806da67e3873503edffd92500c5821949cc73368fb8be25bf2155

    • SHA512

      13689f5c4d6ea8c8d44259d3cbb942e2fe96b0a8520ec11da029e71a021f3619d83eeb2d79c2de1f20e5edf423fb1515e25c2affe32bd8e7520eeaf4c2d830a2

    • SSDEEP

      49152:8sSnXgA9x4vsraFn6a3vtvE5iFHIf/tB4INwvxWIx9hQXxHCy:8sSn0s98AiB+NYsH

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks