General

  • Target

    49111f64bed0ab901f9a2a7f547cba60_NEAS

  • Size

    1.3MB

  • Sample

    240507-b549ksfg79

  • MD5

    49111f64bed0ab901f9a2a7f547cba60

  • SHA1

    be2abdba42ca9e759cb5e4cb746f7dd93d5c858d

  • SHA256

    a20ea0ab1ca65283cd9159a21f6ea1d68985284bd9238692a3dd365994b2ac85

  • SHA512

    9ca7bdf2c762f072dc10dc81f7d807fa69bc11fc4ba240986caf13c2f08874529aa5e30fe72d937f49e872c6b415db82877bd7f25219d688d494378bdf52e882

  • SSDEEP

    24576:+y8sfz+SJ60o1Jf4iprQ4Bpbco1sAw/hgLJTCnMRSAFFFwfy7y3Kkh:N8sLTJcLVM4BVcouZwCMlMpK

Malware Config

Extracted

Family

redline

Botnet

maxbi

C2

185.161.248.73:4164

Attributes
  • auth_value

    6aa7dba884fe45693dfa04c91440daef

Targets

    • Target

      49111f64bed0ab901f9a2a7f547cba60_NEAS

    • Size

      1.3MB

    • MD5

      49111f64bed0ab901f9a2a7f547cba60

    • SHA1

      be2abdba42ca9e759cb5e4cb746f7dd93d5c858d

    • SHA256

      a20ea0ab1ca65283cd9159a21f6ea1d68985284bd9238692a3dd365994b2ac85

    • SHA512

      9ca7bdf2c762f072dc10dc81f7d807fa69bc11fc4ba240986caf13c2f08874529aa5e30fe72d937f49e872c6b415db82877bd7f25219d688d494378bdf52e882

    • SSDEEP

      24576:+y8sfz+SJ60o1Jf4iprQ4Bpbco1sAw/hgLJTCnMRSAFFFwfy7y3Kkh:N8sLTJcLVM4BVcouZwCMlMpK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks