General

  • Target

    737b93112272bc39c820abfc91dfde8d3b7769bffb3f0e6e2bb71c691a114afe

  • Size

    533KB

  • Sample

    241104-q6kzna1dmp

  • MD5

    87d386db4e302f29a1b480819fdb03b7

  • SHA1

    cba5d7bc18256a44099a4c1d369925a90e6a0718

  • SHA256

    737b93112272bc39c820abfc91dfde8d3b7769bffb3f0e6e2bb71c691a114afe

  • SHA512

    aaa681afb8affc93713afd2bb3b639bbd9c5d5965cf68853c6673fa4c01f6319824ec3a709fce711839c2e38acc8967be33f04e4fd500722c5bc906228e87b35

  • SSDEEP

    12288:zMrky90W7S9ms+lfMbNn8uexscoj9N/7tkPHJK95:/yn7Bfwdeloj9NOpS

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      737b93112272bc39c820abfc91dfde8d3b7769bffb3f0e6e2bb71c691a114afe

    • Size

      533KB

    • MD5

      87d386db4e302f29a1b480819fdb03b7

    • SHA1

      cba5d7bc18256a44099a4c1d369925a90e6a0718

    • SHA256

      737b93112272bc39c820abfc91dfde8d3b7769bffb3f0e6e2bb71c691a114afe

    • SHA512

      aaa681afb8affc93713afd2bb3b639bbd9c5d5965cf68853c6673fa4c01f6319824ec3a709fce711839c2e38acc8967be33f04e4fd500722c5bc906228e87b35

    • SSDEEP

      12288:zMrky90W7S9ms+lfMbNn8uexscoj9N/7tkPHJK95:/yn7Bfwdeloj9NOpS

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks