General

  • Target

    ed01a9e4034c2f42409a9bdcac9a3b3868b39b5becd8ac14ba93bdb6788234be

  • Size

    480KB

  • Sample

    241104-qn4n2s1bjl

  • MD5

    1a0e267aec9b9ab473936c94c74c2ad7

  • SHA1

    a0953327b587d4b26991f06cb56d59dbbb6daf8a

  • SHA256

    ed01a9e4034c2f42409a9bdcac9a3b3868b39b5becd8ac14ba93bdb6788234be

  • SHA512

    426a4507cf078d4ad4e87001ce3c9bf58909566a877b9a3e2c7a9fd6b67217ae3c6c2ed55e116562369ffd78940e0624caf7baeadaf702b3abc47271ec454394

  • SSDEEP

    12288:NMrUy90ceYRL3MfanFwF69W0hP2/Hx8f4TPOT5L:1ygmLnFwI93O/HxY4TPi9

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Targets

    • Target

      ed01a9e4034c2f42409a9bdcac9a3b3868b39b5becd8ac14ba93bdb6788234be

    • Size

      480KB

    • MD5

      1a0e267aec9b9ab473936c94c74c2ad7

    • SHA1

      a0953327b587d4b26991f06cb56d59dbbb6daf8a

    • SHA256

      ed01a9e4034c2f42409a9bdcac9a3b3868b39b5becd8ac14ba93bdb6788234be

    • SHA512

      426a4507cf078d4ad4e87001ce3c9bf58909566a877b9a3e2c7a9fd6b67217ae3c6c2ed55e116562369ffd78940e0624caf7baeadaf702b3abc47271ec454394

    • SSDEEP

      12288:NMrUy90ceYRL3MfanFwF69W0hP2/Hx8f4TPOT5L:1ygmLnFwI93O/HxY4TPi9

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks