General

  • Target

    fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f

  • Size

    720KB

  • Sample

    240526-fq3vesga2z

  • MD5

    26a6c9f571da1f281827229690bbc262

  • SHA1

    916c94c00abe47abecc7945ed6db2471b32462bf

  • SHA256

    fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f

  • SHA512

    ddffa882c5da55f3fb6ac445aa5c2a18c56c7f08bd2a6bf66a2dc8bae5fa4e27e6f8ac235c845de3104336bdc68064081f5d1b349b930d7816eb4fa44aab3342

  • SSDEEP

    12288:iICy90HakVOwfql3+fYShpuFNjicL7w/XhhXcSSr6G2K4GgfXt+3:8y6wlJKhpuFNxc/XDZe6XVGgf9+3

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Targets

    • Target

      fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f

    • Size

      720KB

    • MD5

      26a6c9f571da1f281827229690bbc262

    • SHA1

      916c94c00abe47abecc7945ed6db2471b32462bf

    • SHA256

      fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f

    • SHA512

      ddffa882c5da55f3fb6ac445aa5c2a18c56c7f08bd2a6bf66a2dc8bae5fa4e27e6f8ac235c845de3104336bdc68064081f5d1b349b930d7816eb4fa44aab3342

    • SSDEEP

      12288:iICy90HakVOwfql3+fYShpuFNjicL7w/XhhXcSSr6G2K4GgfXt+3:8y6wlJKhpuFNxc/XDZe6XVGgf9+3

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Detects executables packed with ConfuserEx Mod

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks