General

  • Target

    521edd96b5cefb70c7e6e2b6294c895d6f0b2c992bb2e7e5342f3bc7f3539400

  • Size

    661KB

  • Sample

    241104-razcvaznbx

  • MD5

    767d4c1d5269b4e207a810f371c4400c

  • SHA1

    99fd718c8fe9b3b9c990db213af2e7f00b6a436d

  • SHA256

    521edd96b5cefb70c7e6e2b6294c895d6f0b2c992bb2e7e5342f3bc7f3539400

  • SHA512

    c6f746a35ea6349227fb8354677a6b46680477e53c5d8b90f25d5a00d00c10f4a1e408ebf3bffd57bc89a920195c81e525b8acc6b657010801659b648d1eb192

  • SSDEEP

    12288:XMrny90T/rj2t0msJDp4UDP2CWwdtdZNfeDfEoxwnA3Zb:Yym/oqDp4UThWwRQbh

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Targets

    • Target

      521edd96b5cefb70c7e6e2b6294c895d6f0b2c992bb2e7e5342f3bc7f3539400

    • Size

      661KB

    • MD5

      767d4c1d5269b4e207a810f371c4400c

    • SHA1

      99fd718c8fe9b3b9c990db213af2e7f00b6a436d

    • SHA256

      521edd96b5cefb70c7e6e2b6294c895d6f0b2c992bb2e7e5342f3bc7f3539400

    • SHA512

      c6f746a35ea6349227fb8354677a6b46680477e53c5d8b90f25d5a00d00c10f4a1e408ebf3bffd57bc89a920195c81e525b8acc6b657010801659b648d1eb192

    • SSDEEP

      12288:XMrny90T/rj2t0msJDp4UDP2CWwdtdZNfeDfEoxwnA3Zb:Yym/oqDp4UThWwRQbh

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks