General

  • Target

    068afe8976b4672364ddc3876769a283e55c1daca47713dc30a5014f12a7a1aa

  • Size

    930KB

  • Sample

    231014-elp74ahe53

  • MD5

    ae8c1cd8beaa1d8e8cc6a221142722b8

  • SHA1

    7b49862f384462593409d8f3d10f19afd05e9abb

  • SHA256

    068afe8976b4672364ddc3876769a283e55c1daca47713dc30a5014f12a7a1aa

  • SHA512

    d7b68e921cd394c06f96391b07525d1a4bf163b63bee76786a7f16437aaada9d3ed8862bbe74e344e8146d4d909c471a5ba5464387590a8ab81107d9fbf92491

  • SSDEEP

    24576:+iuBtZgce47lrI3jH/dgPoqX5a6oESIYr3h:tuBfg+7lyjH1ggqX5zoHIYt

Malware Config

Extracted

Family

redline

Botnet

moner

C2

77.91.124.82:19071

Attributes
  • auth_value

    a94cd9e01643e1945b296c28a2f28707

Targets

    • Target

      068afe8976b4672364ddc3876769a283e55c1daca47713dc30a5014f12a7a1aa

    • Size

      930KB

    • MD5

      ae8c1cd8beaa1d8e8cc6a221142722b8

    • SHA1

      7b49862f384462593409d8f3d10f19afd05e9abb

    • SHA256

      068afe8976b4672364ddc3876769a283e55c1daca47713dc30a5014f12a7a1aa

    • SHA512

      d7b68e921cd394c06f96391b07525d1a4bf163b63bee76786a7f16437aaada9d3ed8862bbe74e344e8146d4d909c471a5ba5464387590a8ab81107d9fbf92491

    • SSDEEP

      24576:+iuBtZgce47lrI3jH/dgPoqX5a6oESIYr3h:tuBfg+7lyjH1ggqX5zoHIYt

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks