General

  • Target

    70f06dab9cd5714df376fd3bb9228e0bd2a4dd7be1df4a2e3f90512c427b8dd5

  • Size

    530KB

  • Sample

    241104-rbpvsszncy

  • MD5

    6a123325bcb970084369fd0fa00ea6cb

  • SHA1

    962b29a4bb031914349fe0b3551a36082fdd6c96

  • SHA256

    70f06dab9cd5714df376fd3bb9228e0bd2a4dd7be1df4a2e3f90512c427b8dd5

  • SHA512

    ee07365c6b43cb73d084e6d253873c51543550017f8c26d0229092657c27b1cae9990f49a5901551715bd878966c4e578518f6dc290ea71b945c0b8f7bbd6f9e

  • SSDEEP

    12288:qMr3y90pHLtWfe/G19hBosQTvh3cOAPuIcOK:9ywHLtl/GPhBHGNYugK

Malware Config

Extracted

Family

redline

Botnet

rulit

C2

pedigj.eu:4162

Attributes
  • auth_value

    f4df9ef56871d4ac883b282abaf635e0

Targets

    • Target

      70f06dab9cd5714df376fd3bb9228e0bd2a4dd7be1df4a2e3f90512c427b8dd5

    • Size

      530KB

    • MD5

      6a123325bcb970084369fd0fa00ea6cb

    • SHA1

      962b29a4bb031914349fe0b3551a36082fdd6c96

    • SHA256

      70f06dab9cd5714df376fd3bb9228e0bd2a4dd7be1df4a2e3f90512c427b8dd5

    • SHA512

      ee07365c6b43cb73d084e6d253873c51543550017f8c26d0229092657c27b1cae9990f49a5901551715bd878966c4e578518f6dc290ea71b945c0b8f7bbd6f9e

    • SSDEEP

      12288:qMr3y90pHLtWfe/G19hBosQTvh3cOAPuIcOK:9ywHLtl/GPhBHGNYugK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks