General

  • Target

    c52d2523c4d8fa5e1812fa3a324c2c47c1309830b0de0bfa27c81d12735f1f5e

  • Size

    706KB

  • Sample

    240910-cd967a1gqk

  • MD5

    ab7c0a364c6a9696d4c773b239632261

  • SHA1

    00c2538c5a987d078aeac467a8e4bd01017c2d0a

  • SHA256

    c52d2523c4d8fa5e1812fa3a324c2c47c1309830b0de0bfa27c81d12735f1f5e

  • SHA512

    d5c7662d928bef7445bef0418e653bc3be1b4ef551d17ed34031b9e7a6be39e4f457e2829778403a80c80f56878644ba33cf37c21422405114e33b4c60bb06b2

  • SSDEEP

    12288:/MrIy90Lh2n1/7XAbu1gOprUqPKKWx5dS1+jrF9gx5DUnbSDqYOgxjTasYINLG:Hyrn1/7wbHOBzydjSYjHgx5DUnGzTx3S

Malware Config

Extracted

Family

redline

Botnet

jokes

C2

77.91.124.82:19071

Attributes
  • auth_value

    fb7b36b70ae30fb2b72f789037350cdb

Targets

    • Target

      c52d2523c4d8fa5e1812fa3a324c2c47c1309830b0de0bfa27c81d12735f1f5e

    • Size

      706KB

    • MD5

      ab7c0a364c6a9696d4c773b239632261

    • SHA1

      00c2538c5a987d078aeac467a8e4bd01017c2d0a

    • SHA256

      c52d2523c4d8fa5e1812fa3a324c2c47c1309830b0de0bfa27c81d12735f1f5e

    • SHA512

      d5c7662d928bef7445bef0418e653bc3be1b4ef551d17ed34031b9e7a6be39e4f457e2829778403a80c80f56878644ba33cf37c21422405114e33b4c60bb06b2

    • SSDEEP

      12288:/MrIy90Lh2n1/7XAbu1gOprUqPKKWx5dS1+jrF9gx5DUnbSDqYOgxjTasYINLG:Hyrn1/7wbHOBzydjSYjHgx5DUnGzTx3S

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks