General

  • Target

    641e73343af489f62956e0fe13b73bf45ead67848d62ed93687d983e97630dba

  • Size

    1.0MB

  • Sample

    241104-q5gkvazhpf

  • MD5

    3dd8cb2401ad5b815c866f4a3f86c8ea

  • SHA1

    0df300712595162340c38619b592d5a3b66b0598

  • SHA256

    641e73343af489f62956e0fe13b73bf45ead67848d62ed93687d983e97630dba

  • SHA512

    953ae3b7b94c4e9d59a41cce5fce02d5f1f4b803f37968bd9a291b601a04e0d559e05548b2fbfca9c5bf7de8dc2078ada91041e52e5936b3d458e44eec23b6c7

  • SSDEEP

    24576:5yWypHMKIpakv2trPBMcTETh0JBhei9GmnaReG:sWypgaJJBTeaFtn

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      641e73343af489f62956e0fe13b73bf45ead67848d62ed93687d983e97630dba

    • Size

      1.0MB

    • MD5

      3dd8cb2401ad5b815c866f4a3f86c8ea

    • SHA1

      0df300712595162340c38619b592d5a3b66b0598

    • SHA256

      641e73343af489f62956e0fe13b73bf45ead67848d62ed93687d983e97630dba

    • SHA512

      953ae3b7b94c4e9d59a41cce5fce02d5f1f4b803f37968bd9a291b601a04e0d559e05548b2fbfca9c5bf7de8dc2078ada91041e52e5936b3d458e44eec23b6c7

    • SSDEEP

      24576:5yWypHMKIpakv2trPBMcTETh0JBhei9GmnaReG:sWypgaJJBTeaFtn

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks