General

  • Target

    d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9

  • Size

    533KB

  • Sample

    241104-qctppsyre1

  • MD5

    b1bdd5fcd884450e606741f30926567e

  • SHA1

    6522d48725ebf461a9af68acdf9191049380ad0e

  • SHA256

    d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9

  • SHA512

    cf405499339c2a73a64e5f7340350083a1a3c90d0ed51d2b0a0079a29cf96e2536c99f3ca1425fedbf4775fd97e97f21e7de2146f01ee98a245d2d2fbe706c33

  • SSDEEP

    12288:BMrBy90ZP7dPA5Cai6XGSNESRwvcpBfiVqL9laW1z9G:IyoPZPWC8hZscp8OHG

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9

    • Size

      533KB

    • MD5

      b1bdd5fcd884450e606741f30926567e

    • SHA1

      6522d48725ebf461a9af68acdf9191049380ad0e

    • SHA256

      d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9

    • SHA512

      cf405499339c2a73a64e5f7340350083a1a3c90d0ed51d2b0a0079a29cf96e2536c99f3ca1425fedbf4775fd97e97f21e7de2146f01ee98a245d2d2fbe706c33

    • SSDEEP

      12288:BMrBy90ZP7dPA5Cai6XGSNESRwvcpBfiVqL9laW1z9G:IyoPZPWC8hZscp8OHG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks