General

  • Target

    ad1404009edd6df98168c20b8543517a51d0492a145634c68a361b4f32291049

  • Size

    666KB

  • Sample

    241104-rmgnka1fnr

  • MD5

    2cd7aba0707d37b3eb97c88f4172cf87

  • SHA1

    591965bbf361a41262c60249a09d23eb5eacd526

  • SHA256

    ad1404009edd6df98168c20b8543517a51d0492a145634c68a361b4f32291049

  • SHA512

    ad6e987dd5bdf5a04247711d52f6c4ef810d0ea88ef8f5a277e836b3d45628565cddac1e2b91b8ef5e7b28043775f60365b1b112715760ad2436101c50ce620c

  • SSDEEP

    12288:BMr2y90IPFfyrA7DL8bUxuX2XdGO5k4MrOdmR3X6N3PbB38BPISYdEcghoM5n:7ytMryL8ow8dGO5kr53wzB38B7mM5n

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Targets

    • Target

      ad1404009edd6df98168c20b8543517a51d0492a145634c68a361b4f32291049

    • Size

      666KB

    • MD5

      2cd7aba0707d37b3eb97c88f4172cf87

    • SHA1

      591965bbf361a41262c60249a09d23eb5eacd526

    • SHA256

      ad1404009edd6df98168c20b8543517a51d0492a145634c68a361b4f32291049

    • SHA512

      ad6e987dd5bdf5a04247711d52f6c4ef810d0ea88ef8f5a277e836b3d45628565cddac1e2b91b8ef5e7b28043775f60365b1b112715760ad2436101c50ce620c

    • SSDEEP

      12288:BMr2y90IPFfyrA7DL8bUxuX2XdGO5k4MrOdmR3X6N3PbB38BPISYdEcghoM5n:7ytMryL8ow8dGO5kr53wzB38B7mM5n

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks