General

  • Target

    34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95

  • Size

    536KB

  • Sample

    241030-1t2fzssbjh

  • MD5

    11657d20cb98ff5ff73000a8a64bf6c0

  • SHA1

    6975ae735cb259f57a2e60a525cf3174c7824181

  • SHA256

    34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95

  • SHA512

    5bf3d19cbc2486906663160e2d25afabc42e90c9a6f1fd268cf16d37a43da7c3d8204baf8cd3e7225efb4aa587acb60d42ce29a34208fa50c0c6cf67d59127be

  • SSDEEP

    12288:cMrty90ww4sz89s2wnVrLkArzYnLL0RDBTNZ:hyWJz89sXn5LkAr8nL4NZ

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95

    • Size

      536KB

    • MD5

      11657d20cb98ff5ff73000a8a64bf6c0

    • SHA1

      6975ae735cb259f57a2e60a525cf3174c7824181

    • SHA256

      34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95

    • SHA512

      5bf3d19cbc2486906663160e2d25afabc42e90c9a6f1fd268cf16d37a43da7c3d8204baf8cd3e7225efb4aa587acb60d42ce29a34208fa50c0c6cf67d59127be

    • SSDEEP

      12288:cMrty90ww4sz89s2wnVrLkArzYnLL0RDBTNZ:hyWJz89sXn5LkAr8nL4NZ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks