General

  • Target

    d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80

  • Size

    534KB

  • Sample

    241030-1vgg7stkaq

  • MD5

    8c9e4c87ce4b245f422ec1a83a0d7b7f

  • SHA1

    214e42656921b45e73291306ec9f8ed3a81b8b7f

  • SHA256

    d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80

  • SHA512

    ee734c455d70e359baf6bbc675bed9c622074956d27d1580c340287751ea8c4165085f88f5e50ef9f565fb18bca695237c2bcd81f3ace6793e1194b75338cf3c

  • SSDEEP

    12288:TMryy90fARLG83uKUvmc/CfaaA6g7fiVGipIke9q9bRi:JyDL33u+YyaaAP2UQEEbRi

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80

    • Size

      534KB

    • MD5

      8c9e4c87ce4b245f422ec1a83a0d7b7f

    • SHA1

      214e42656921b45e73291306ec9f8ed3a81b8b7f

    • SHA256

      d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80

    • SHA512

      ee734c455d70e359baf6bbc675bed9c622074956d27d1580c340287751ea8c4165085f88f5e50ef9f565fb18bca695237c2bcd81f3ace6793e1194b75338cf3c

    • SSDEEP

      12288:TMryy90fARLG83uKUvmc/CfaaA6g7fiVGipIke9q9bRi:JyDL33u+YyaaAP2UQEEbRi

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks