General

  • Target

    150d5d207fadbb612a41c8c9dae6ffe50c8cffd2db96a1cb75a5c779cbd82974

  • Size

    480KB

  • Sample

    240509-xh7bbace92

  • MD5

    b2bd84c5900716a004ee100a29e7de7f

  • SHA1

    6b08dd3460398f5339bb513f37aa4756476b58ac

  • SHA256

    150d5d207fadbb612a41c8c9dae6ffe50c8cffd2db96a1cb75a5c779cbd82974

  • SHA512

    1851b7ac20c259cd2cc2dda50aa24228f8549800bb9972bccf7b47197eac27b9e4337fec15556b40a4719170bba061f4e2441c6e868c1983ebf4d612c89a8d18

  • SSDEEP

    12288:LMrvy90+QotLWwaMn0jXPM63xigzNPkA2c/Q2i/A:QyVL+tJvPi4

Malware Config

Extracted

Family

redline

Botnet

mihan

C2

217.196.96.101:4132

Attributes
  • auth_value

    9a6a8fdae02ed7caa0a49a6ddc6d4520

Targets

    • Target

      150d5d207fadbb612a41c8c9dae6ffe50c8cffd2db96a1cb75a5c779cbd82974

    • Size

      480KB

    • MD5

      b2bd84c5900716a004ee100a29e7de7f

    • SHA1

      6b08dd3460398f5339bb513f37aa4756476b58ac

    • SHA256

      150d5d207fadbb612a41c8c9dae6ffe50c8cffd2db96a1cb75a5c779cbd82974

    • SHA512

      1851b7ac20c259cd2cc2dda50aa24228f8549800bb9972bccf7b47197eac27b9e4337fec15556b40a4719170bba061f4e2441c6e868c1983ebf4d612c89a8d18

    • SSDEEP

      12288:LMrvy90+QotLWwaMn0jXPM63xigzNPkA2c/Q2i/A:QyVL+tJvPi4

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Detects executables packed with ConfuserEx Mod

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks