General

  • Target

    40798ddaa6e449349224c60a980b73b4b082e8f19904c7b9acbadcbf8441a2e3

  • Size

    688KB

  • Sample

    240301-ynzdbscd9t

  • MD5

    5443807248ff11ca1adcd7ba7624d2a3

  • SHA1

    dd0634f2649e07d9c2d6ff743d2322524a81aa98

  • SHA256

    40798ddaa6e449349224c60a980b73b4b082e8f19904c7b9acbadcbf8441a2e3

  • SHA512

    3aabb9ae085db807cf2248a52ef41bda853c5571529a13d7d6dfb403163548266eafb1eeacd54f0939aeeeb280c95f5fe2f159002dbc18f7fe7e8f468d08908a

  • SSDEEP

    12288:pMrfy90HzCb2NhIZ2KEMkaRfCZEPMREgUMImVYqgF61L5txx91DUQP:eygzC6fjFkKREg/R7gF61vxRP

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      40798ddaa6e449349224c60a980b73b4b082e8f19904c7b9acbadcbf8441a2e3

    • Size

      688KB

    • MD5

      5443807248ff11ca1adcd7ba7624d2a3

    • SHA1

      dd0634f2649e07d9c2d6ff743d2322524a81aa98

    • SHA256

      40798ddaa6e449349224c60a980b73b4b082e8f19904c7b9acbadcbf8441a2e3

    • SHA512

      3aabb9ae085db807cf2248a52ef41bda853c5571529a13d7d6dfb403163548266eafb1eeacd54f0939aeeeb280c95f5fe2f159002dbc18f7fe7e8f468d08908a

    • SSDEEP

      12288:pMrfy90HzCb2NhIZ2KEMkaRfCZEPMREgUMImVYqgF61L5txx91DUQP:eygzC6fjFkKREg/R7gF61vxRP

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks