General

  • Target

    7e5654c93f733449333dd48a25be7abbd0241774dee6b4b63685f7e30ccf54b1

  • Size

    837KB

  • Sample

    241104-qc1g9ayrfv

  • MD5

    f2ddda72c0495f6b5fbc4f0e1818fc9a

  • SHA1

    64b30b03ca26c7b4557331fdddb84cb50b1abd03

  • SHA256

    7e5654c93f733449333dd48a25be7abbd0241774dee6b4b63685f7e30ccf54b1

  • SHA512

    9f368b4dbecaa6ee93db5b543d7ba032cd27fc8b3375bcf5569e61bc0c0bd7b1c3ab13e70231cbdefcf5477be923d6b37161999bfac62bb0ec169ef3f921159b

  • SSDEEP

    12288:rMrHy90ZUH+hjV6SIujCwOMwohNGrPACI4Vw/GC77zy1nNxkJZ4ACPspVCy3jWV6:wyWV6SIuewOMJNAPhwJrGhADiwk6

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      7e5654c93f733449333dd48a25be7abbd0241774dee6b4b63685f7e30ccf54b1

    • Size

      837KB

    • MD5

      f2ddda72c0495f6b5fbc4f0e1818fc9a

    • SHA1

      64b30b03ca26c7b4557331fdddb84cb50b1abd03

    • SHA256

      7e5654c93f733449333dd48a25be7abbd0241774dee6b4b63685f7e30ccf54b1

    • SHA512

      9f368b4dbecaa6ee93db5b543d7ba032cd27fc8b3375bcf5569e61bc0c0bd7b1c3ab13e70231cbdefcf5477be923d6b37161999bfac62bb0ec169ef3f921159b

    • SSDEEP

      12288:rMrHy90ZUH+hjV6SIujCwOMwohNGrPACI4Vw/GC77zy1nNxkJZ4ACPspVCy3jWV6:wyWV6SIuewOMJNAPhwJrGhADiwk6

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks