General

  • Target

    3891cfba779d688e9ae2181414762ef22efb65f0b785863d0d2b3f7c697d33a4

  • Size

    531KB

  • Sample

    241104-rlvtsszpg1

  • MD5

    5a14a8855922516db41feb52e077a26c

  • SHA1

    e7b810a6d83fc657201377f1030f2cb587042466

  • SHA256

    3891cfba779d688e9ae2181414762ef22efb65f0b785863d0d2b3f7c697d33a4

  • SHA512

    cca15cbb8baf00110105ee066646a89e994ea007432aca8b4ad0e431f479f1e9d80b1abe88a273053ec13cfc5815b81419422ceabe309afce308bd300e9abe31

  • SSDEEP

    12288:CMrky90aqTm4qV99u0vowAfjNUWepyBj4cTtyt3TdaU81eRTwMdU:uyDqTmDVNvowqjwpyXTQt3TE9Me

Malware Config

Extracted

Family

redline

Botnet

rulit

C2

pedigj.eu:4162

Attributes
  • auth_value

    f4df9ef56871d4ac883b282abaf635e0

Targets

    • Target

      3891cfba779d688e9ae2181414762ef22efb65f0b785863d0d2b3f7c697d33a4

    • Size

      531KB

    • MD5

      5a14a8855922516db41feb52e077a26c

    • SHA1

      e7b810a6d83fc657201377f1030f2cb587042466

    • SHA256

      3891cfba779d688e9ae2181414762ef22efb65f0b785863d0d2b3f7c697d33a4

    • SHA512

      cca15cbb8baf00110105ee066646a89e994ea007432aca8b4ad0e431f479f1e9d80b1abe88a273053ec13cfc5815b81419422ceabe309afce308bd300e9abe31

    • SSDEEP

      12288:CMrky90aqTm4qV99u0vowAfjNUWepyBj4cTtyt3TdaU81eRTwMdU:uyDqTmDVNvowqjwpyXTQt3TE9Me

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks