General

  • Target

    148b6890b067b9a3e8d1c47ddd02c1c6b070f69613eed4e6a03b18cb6dda1956

  • Size

    569KB

  • Sample

    241104-qx1czszgpc

  • MD5

    36c4609a98df4020f4597bc3e7149935

  • SHA1

    bc1b9d957a22015af74c7187f7dc79f8781fdd20

  • SHA256

    148b6890b067b9a3e8d1c47ddd02c1c6b070f69613eed4e6a03b18cb6dda1956

  • SHA512

    373e3fb4e949eaf17d4b1322a62c7a4aa395a2bebfbbe791cbb6213bb6561056846a10444494c490ff07735c92559fc10a9525fff221be7ce459abce2779a4b7

  • SSDEEP

    12288:1MrQy90Iahimz7AuxqVrhAfM7hjpKewASe4Ts33:BydsVAuxY1T738pu

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      148b6890b067b9a3e8d1c47ddd02c1c6b070f69613eed4e6a03b18cb6dda1956

    • Size

      569KB

    • MD5

      36c4609a98df4020f4597bc3e7149935

    • SHA1

      bc1b9d957a22015af74c7187f7dc79f8781fdd20

    • SHA256

      148b6890b067b9a3e8d1c47ddd02c1c6b070f69613eed4e6a03b18cb6dda1956

    • SHA512

      373e3fb4e949eaf17d4b1322a62c7a4aa395a2bebfbbe791cbb6213bb6561056846a10444494c490ff07735c92559fc10a9525fff221be7ce459abce2779a4b7

    • SSDEEP

      12288:1MrQy90Iahimz7AuxqVrhAfM7hjpKewASe4Ts33:BydsVAuxY1T738pu

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks