General

  • Target

    d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1

  • Size

    666KB

  • Sample

    240304-bd4hzade4v

  • MD5

    1deac687b6874a859a92c617d67ad5b7

  • SHA1

    a7774936595b5993c1487c2383e844e9a0263c3d

  • SHA256

    d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1

  • SHA512

    d283ba11dc4052b61cfe329d51d5712ff6c6717751560245ef4159f8929cb41d8673e22337600d6119ff4ef5510aa133bcf5c47bbc768c22742f5ab2d081756d

  • SSDEEP

    12288:6MrSy90suTShb8NOE2pLqd/oBht5Yque2QuSqDVbuLvszBCyBR:IyiTShb8NOpwoBhPYnziCbu8CyBR

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Targets

    • Target

      d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1

    • Size

      666KB

    • MD5

      1deac687b6874a859a92c617d67ad5b7

    • SHA1

      a7774936595b5993c1487c2383e844e9a0263c3d

    • SHA256

      d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1

    • SHA512

      d283ba11dc4052b61cfe329d51d5712ff6c6717751560245ef4159f8929cb41d8673e22337600d6119ff4ef5510aa133bcf5c47bbc768c22742f5ab2d081756d

    • SSDEEP

      12288:6MrSy90suTShb8NOE2pLqd/oBht5Yque2QuSqDVbuLvszBCyBR:IyiTShb8NOpwoBhPYnziCbu8CyBR

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks