General

  • Target

    47b7d5633a472e507d3ab148dc5c24c306800a24c16b6d30046290453738b72d

  • Size

    480KB

  • Sample

    241104-rkf91stmbj

  • MD5

    04a1e1aa7c1b7fd6b8b20fec1dff6948

  • SHA1

    ca13a46ed521abfd052cfada607c9f936cec6848

  • SHA256

    47b7d5633a472e507d3ab148dc5c24c306800a24c16b6d30046290453738b72d

  • SHA512

    f6474efa93ce27a3f6d8d7eb53ac8e3bc657d1b437361a69c26d8e75499c9a1ec67f75a2e04a1a7e4be6401efd159247441b4d5deece729fa61f854af951d996

  • SSDEEP

    12288:OMroy90mAuLPs5c1u31+Ttm7PoOom1gRlKOeIUNMa:ayKujMXMTaPU4g3sNMa

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Targets

    • Target

      47b7d5633a472e507d3ab148dc5c24c306800a24c16b6d30046290453738b72d

    • Size

      480KB

    • MD5

      04a1e1aa7c1b7fd6b8b20fec1dff6948

    • SHA1

      ca13a46ed521abfd052cfada607c9f936cec6848

    • SHA256

      47b7d5633a472e507d3ab148dc5c24c306800a24c16b6d30046290453738b72d

    • SHA512

      f6474efa93ce27a3f6d8d7eb53ac8e3bc657d1b437361a69c26d8e75499c9a1ec67f75a2e04a1a7e4be6401efd159247441b4d5deece729fa61f854af951d996

    • SSDEEP

      12288:OMroy90mAuLPs5c1u31+Ttm7PoOom1gRlKOeIUNMa:ayKujMXMTaPU4g3sNMa

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks