General

  • Target

    400a6d7b57053b34e5d9b99f4a6c16f7c71accdf98926cd6e88e4d7ccb4b0748

  • Size

    1.1MB

  • Sample

    241104-jfjkksxcrh

  • MD5

    741c0555a170248aba9d97b60505b02f

  • SHA1

    4f8e1b4de8577f80f39633a92b7700ec2cb89788

  • SHA256

    400a6d7b57053b34e5d9b99f4a6c16f7c71accdf98926cd6e88e4d7ccb4b0748

  • SHA512

    a668432cd31a9702293004456f6a37db274620b47906364ee02ec6c61502a72b09ebc915c657762aab8805d8033e40ab86189c16436ee561221a691a9eea7ac7

  • SSDEEP

    24576:hyuR9COYqYbLB9ixfBPp+YfBpMzSKesujFLL5O:U0COYqYXOB+YP0yJLL

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      400a6d7b57053b34e5d9b99f4a6c16f7c71accdf98926cd6e88e4d7ccb4b0748

    • Size

      1.1MB

    • MD5

      741c0555a170248aba9d97b60505b02f

    • SHA1

      4f8e1b4de8577f80f39633a92b7700ec2cb89788

    • SHA256

      400a6d7b57053b34e5d9b99f4a6c16f7c71accdf98926cd6e88e4d7ccb4b0748

    • SHA512

      a668432cd31a9702293004456f6a37db274620b47906364ee02ec6c61502a72b09ebc915c657762aab8805d8033e40ab86189c16436ee561221a691a9eea7ac7

    • SSDEEP

      24576:hyuR9COYqYbLB9ixfBPp+YfBpMzSKesujFLL5O:U0COYqYXOB+YP0yJLL

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks