General

  • Target

    70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d

  • Size

    852KB

  • Sample

    241104-rfj54szpay

  • MD5

    dbcf0750ca1c04a4992e3125d69c86c7

  • SHA1

    1fca865bddd27c6e033852aa09ea05ef5a82db21

  • SHA256

    70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d

  • SHA512

    2f9f40631d72a8b80178dd525da71742b92c893b1e671458f69aad98020e886c473ce01f7148292daa40f9508f8ddccbead145eaf927730d2ff4577fec247766

  • SSDEEP

    12288:yMrmy90myNOtax/0R8jDYO3UrQ4GUBignQJddcTdNwQ2yz4WbxVU31GdbhCJG+g:4y0EsnoEUxGUpnQKTdSixxVU3GI0+g

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d

    • Size

      852KB

    • MD5

      dbcf0750ca1c04a4992e3125d69c86c7

    • SHA1

      1fca865bddd27c6e033852aa09ea05ef5a82db21

    • SHA256

      70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d

    • SHA512

      2f9f40631d72a8b80178dd525da71742b92c893b1e671458f69aad98020e886c473ce01f7148292daa40f9508f8ddccbead145eaf927730d2ff4577fec247766

    • SSDEEP

      12288:yMrmy90myNOtax/0R8jDYO3UrQ4GUBignQJddcTdNwQ2yz4WbxVU31GdbhCJG+g:4y0EsnoEUxGUpnQKTdSixxVU3GI0+g

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks