General

  • Target

    53aa851ca15b76f3da0f14642124fde2e24db2ce00900e79539c9b72d3e3bf9c

  • Size

    929KB

  • Sample

    231014-eal2asgd69

  • MD5

    1124ffdc20442750558997c977d968ac

  • SHA1

    0152b708df9cb8346a9e6304f16feb5191c90a71

  • SHA256

    53aa851ca15b76f3da0f14642124fde2e24db2ce00900e79539c9b72d3e3bf9c

  • SHA512

    54b736562fc16f4ef6436a90b6173c0a59850d24a1124208511ab737e63e75f2561e45fb6e004b62cdbf3d4bcb5a10ec3fab68910c3373750720148d47ac3e18

  • SSDEEP

    24576:miuBtZ/sUZyXiu+0WKpWeRpg8QKfo9Ru:1uBfEUZyyu+030e/Q+o3u

Malware Config

Extracted

Family

redline

Botnet

moner

C2

77.91.124.82:19071

Attributes
  • auth_value

    a94cd9e01643e1945b296c28a2f28707

Targets

    • Target

      53aa851ca15b76f3da0f14642124fde2e24db2ce00900e79539c9b72d3e3bf9c

    • Size

      929KB

    • MD5

      1124ffdc20442750558997c977d968ac

    • SHA1

      0152b708df9cb8346a9e6304f16feb5191c90a71

    • SHA256

      53aa851ca15b76f3da0f14642124fde2e24db2ce00900e79539c9b72d3e3bf9c

    • SHA512

      54b736562fc16f4ef6436a90b6173c0a59850d24a1124208511ab737e63e75f2561e45fb6e004b62cdbf3d4bcb5a10ec3fab68910c3373750720148d47ac3e18

    • SSDEEP

      24576:miuBtZ/sUZyXiu+0WKpWeRpg8QKfo9Ru:1uBfEUZyyu+030e/Q+o3u

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks