General

  • Target

    af1b400c4d8b07b2e642b61dac0e1edb4ba3681ef725a57bfe776116f34619df

  • Size

    837KB

  • Sample

    241104-q9qz3sznay

  • MD5

    2c8fcbde73b0ac124981e8025f947df4

  • SHA1

    cc31a77f9a6521668e056bbad67565a9fbede9dc

  • SHA256

    af1b400c4d8b07b2e642b61dac0e1edb4ba3681ef725a57bfe776116f34619df

  • SHA512

    cc1c65c44192e2ae1325f86814587f0cad8303850f1c6f7107f9df6bc06e32d398e1323f0dd3c9cc0951d492920a0877f98569b6bdc2075ca3e98053a914da56

  • SSDEEP

    12288:4Mr7y90MxrBAmuBcJ/8wHBkItJJJNLj441iLiQYqb4pnZaUaAfcXG9XOjci5o:DyXrBBuM/hBkEvl4FLBKZaUaB4ici6

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      af1b400c4d8b07b2e642b61dac0e1edb4ba3681ef725a57bfe776116f34619df

    • Size

      837KB

    • MD5

      2c8fcbde73b0ac124981e8025f947df4

    • SHA1

      cc31a77f9a6521668e056bbad67565a9fbede9dc

    • SHA256

      af1b400c4d8b07b2e642b61dac0e1edb4ba3681ef725a57bfe776116f34619df

    • SHA512

      cc1c65c44192e2ae1325f86814587f0cad8303850f1c6f7107f9df6bc06e32d398e1323f0dd3c9cc0951d492920a0877f98569b6bdc2075ca3e98053a914da56

    • SSDEEP

      12288:4Mr7y90MxrBAmuBcJ/8wHBkItJJJNLj441iLiQYqb4pnZaUaAfcXG9XOjci5o:DyXrBBuM/hBkEvl4FLBKZaUaB4ici6

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks