General

  • Target

    81c89076b5ecf2c1a1c8a10a89a362840e7eb95fe17a06e0635a51e3810e2b95

  • Size

    540KB

  • Sample

    240323-166w8sfg2z

  • MD5

    b2fd644488c1be4c52a5c3ac7bb03d2d

  • SHA1

    cca376208325d857a146d92e6c9b1359749a05a9

  • SHA256

    81c89076b5ecf2c1a1c8a10a89a362840e7eb95fe17a06e0635a51e3810e2b95

  • SHA512

    5ac96f09c2c183bb792bc3336e00d51959f8062bd1fe530087c63ea4d6847f62b2ac06b0c02f8ea5d834c7f4fa0235f3f04d40521468212eff233c5fe242504d

  • SSDEEP

    12288:eMrcy90fMn/TjdU/iE3bx89E0dAC0GWvpDEL4oV3RRX1vwj:2yD/vSbAeC0GWxDEnV3RRX8

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Targets

    • Target

      81c89076b5ecf2c1a1c8a10a89a362840e7eb95fe17a06e0635a51e3810e2b95

    • Size

      540KB

    • MD5

      b2fd644488c1be4c52a5c3ac7bb03d2d

    • SHA1

      cca376208325d857a146d92e6c9b1359749a05a9

    • SHA256

      81c89076b5ecf2c1a1c8a10a89a362840e7eb95fe17a06e0635a51e3810e2b95

    • SHA512

      5ac96f09c2c183bb792bc3336e00d51959f8062bd1fe530087c63ea4d6847f62b2ac06b0c02f8ea5d834c7f4fa0235f3f04d40521468212eff233c5fe242504d

    • SSDEEP

      12288:eMrcy90fMn/TjdU/iE3bx89E0dAC0GWvpDEL4oV3RRX1vwj:2yD/vSbAeC0GWxDEnV3RRX8

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Tasks