General

  • Target

    1d74f48646b449fcc497b045e8b9f95dc34b834653908d6c88affa96b860daa0

  • Size

    479KB

  • Sample

    241030-12rlrasbrf

  • MD5

    b6bf0f1a8b20c949745b9d66f0e39428

  • SHA1

    dfdc3f44858e29305d0a6fd11f953cd4d27d1ec1

  • SHA256

    1d74f48646b449fcc497b045e8b9f95dc34b834653908d6c88affa96b860daa0

  • SHA512

    820c3675b52e8e35241ad4f864adcedf475e4a825391fa75205b130baecfa325c8792cc7ea32b4acf88637a70fa83741322996d3a405a4a5feed11845450cf17

  • SSDEEP

    12288:MMrgy90Sb2Tl6i+A3dR0ncn9GwPDI94BgCq5QGxyJU:cyT2Tl3nd9G5Us5QXJU

Malware Config

Extracted

Family

redline

Botnet

dippo

C2

217.196.96.102:4132

Attributes
  • auth_value

    79490ff628fd6af3b29170c3c163874b

Targets

    • Target

      1d74f48646b449fcc497b045e8b9f95dc34b834653908d6c88affa96b860daa0

    • Size

      479KB

    • MD5

      b6bf0f1a8b20c949745b9d66f0e39428

    • SHA1

      dfdc3f44858e29305d0a6fd11f953cd4d27d1ec1

    • SHA256

      1d74f48646b449fcc497b045e8b9f95dc34b834653908d6c88affa96b860daa0

    • SHA512

      820c3675b52e8e35241ad4f864adcedf475e4a825391fa75205b130baecfa325c8792cc7ea32b4acf88637a70fa83741322996d3a405a4a5feed11845450cf17

    • SSDEEP

      12288:MMrgy90Sb2Tl6i+A3dR0ncn9GwPDI94BgCq5QGxyJU:cyT2Tl3nd9G5Us5QXJU

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks