General

  • Target

    d47c8f91ec2375996ef9a6247f30a70118425ea23afb06d9e87597292eb15f13

  • Size

    693KB

  • Sample

    240304-a7c3faeb38

  • MD5

    b9a1ee247b89fbbfe76c215073d96b4f

  • SHA1

    6117cb9a38775531f8a83d42c2c1328e8c1a6183

  • SHA256

    d47c8f91ec2375996ef9a6247f30a70118425ea23afb06d9e87597292eb15f13

  • SHA512

    bdee37b241dc4f0a496e483982d54810a60479c6ae39a67d5194de558b05f3f9ab611eff3a73d78bdfb89ef7569449b3845549feea89c291a6540656dcec3aae

  • SSDEEP

    12288:uMrHy90KdEfVhXaxZILGYumxTDBhCDpCGhHEdamOAY+x8KVe:5yPCVuxmxT73GhH0ue6

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Targets

    • Target

      d47c8f91ec2375996ef9a6247f30a70118425ea23afb06d9e87597292eb15f13

    • Size

      693KB

    • MD5

      b9a1ee247b89fbbfe76c215073d96b4f

    • SHA1

      6117cb9a38775531f8a83d42c2c1328e8c1a6183

    • SHA256

      d47c8f91ec2375996ef9a6247f30a70118425ea23afb06d9e87597292eb15f13

    • SHA512

      bdee37b241dc4f0a496e483982d54810a60479c6ae39a67d5194de558b05f3f9ab611eff3a73d78bdfb89ef7569449b3845549feea89c291a6540656dcec3aae

    • SSDEEP

      12288:uMrHy90KdEfVhXaxZILGYumxTDBhCDpCGhHEdamOAY+x8KVe:5yPCVuxmxT73GhH0ue6

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks