General

  • Target

    af63a0840769b5d7fed3005e16a849822ad67d0db9376bd285b00071a4110bb5

  • Size

    566KB

  • Sample

    240524-cbxs3shd28

  • MD5

    0809d10c714cc165b6affe65339f759f

  • SHA1

    c0f4cf73ab08525a8d8c2730bf51e7fc81f70e3e

  • SHA256

    af63a0840769b5d7fed3005e16a849822ad67d0db9376bd285b00071a4110bb5

  • SHA512

    7e90f897bbb8581d01dd8c625cff5eaa025c6b57a00520691b64127c6e77beca84b0960436e80aea8626b509bb8aa73880f4f711bbd5c6c2471f8ccca2b085c3

  • SSDEEP

    12288:9Mrly90wPJc8rmYUx672ZjtuvNv03NOotO+wPil/8FHUnn:EytJcbYUx6yVQlELOvPOAHQ

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Targets

    • Target

      af63a0840769b5d7fed3005e16a849822ad67d0db9376bd285b00071a4110bb5

    • Size

      566KB

    • MD5

      0809d10c714cc165b6affe65339f759f

    • SHA1

      c0f4cf73ab08525a8d8c2730bf51e7fc81f70e3e

    • SHA256

      af63a0840769b5d7fed3005e16a849822ad67d0db9376bd285b00071a4110bb5

    • SHA512

      7e90f897bbb8581d01dd8c625cff5eaa025c6b57a00520691b64127c6e77beca84b0960436e80aea8626b509bb8aa73880f4f711bbd5c6c2471f8ccca2b085c3

    • SSDEEP

      12288:9Mrly90wPJc8rmYUx672ZjtuvNv03NOotO+wPil/8FHUnn:EytJcbYUx6yVQlELOvPOAHQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Detects executables packed with ConfuserEx Mod

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks