General

  • Target

    a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57

  • Size

    917KB

  • Sample

    240330-1v1abafe5s

  • MD5

    6fdfe49a6a2bfde4671bffb38d338f33

  • SHA1

    35f4533d79757b9e614a87f19a7a6124fb2c428a

  • SHA256

    a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57

  • SHA512

    6c8e571007a8c46f729b1269bf184779f3572ec2edcc8e68e8286fd34560726f63ffe90a118ee14680e1573e0b56643a1232e18aeb5b7789918ca9a07f4e57c5

  • SSDEEP

    24576:yySANA2vRMtGsJa0pZjc+whK6qVPvqx6jrTd:Z1NA25MtGsJa0TjNw46OX

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57

    • Size

      917KB

    • MD5

      6fdfe49a6a2bfde4671bffb38d338f33

    • SHA1

      35f4533d79757b9e614a87f19a7a6124fb2c428a

    • SHA256

      a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57

    • SHA512

      6c8e571007a8c46f729b1269bf184779f3572ec2edcc8e68e8286fd34560726f63ffe90a118ee14680e1573e0b56643a1232e18aeb5b7789918ca9a07f4e57c5

    • SSDEEP

      24576:yySANA2vRMtGsJa0pZjc+whK6qVPvqx6jrTd:Z1NA25MtGsJa0TjNw46OX

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Detects executables packed with ConfuserEx Mod

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Tasks