General

  • Target

    a50f81ad2165781c96c31866c124e948c7a81438f0e28c3ef63c3f2d6dff822b

  • Size

    1.1MB

  • Sample

    241104-rnqb4azqbv

  • MD5

    8bde774d23b06cd8f16e277779fd429c

  • SHA1

    821ef57a4eb68ad0956fe0de9c2c938a2f7d842f

  • SHA256

    a50f81ad2165781c96c31866c124e948c7a81438f0e28c3ef63c3f2d6dff822b

  • SHA512

    7838db86e1735d9497f9c94200e767b0776dcc4ad98af6137132fd0c5a75ee254751be070d6a3933f4ae78fb465bb5bf97ecc649c1450f01f43c635258224e64

  • SSDEEP

    24576:ry2rT/w9pMlb72dieKUO0USWDErCFbzws8uOXegoQFLsje:e2rTqMliQp7SwErywXd

Malware Config

Extracted

Family

redline

Botnet

ramon

C2

193.233.20.23:4123

Attributes
  • auth_value

    3197576965d9513f115338c233015b40

Targets

    • Target

      a50f81ad2165781c96c31866c124e948c7a81438f0e28c3ef63c3f2d6dff822b

    • Size

      1.1MB

    • MD5

      8bde774d23b06cd8f16e277779fd429c

    • SHA1

      821ef57a4eb68ad0956fe0de9c2c938a2f7d842f

    • SHA256

      a50f81ad2165781c96c31866c124e948c7a81438f0e28c3ef63c3f2d6dff822b

    • SHA512

      7838db86e1735d9497f9c94200e767b0776dcc4ad98af6137132fd0c5a75ee254751be070d6a3933f4ae78fb465bb5bf97ecc649c1450f01f43c635258224e64

    • SSDEEP

      24576:ry2rT/w9pMlb72dieKUO0USWDErCFbzws8uOXegoQFLsje:e2rTqMliQp7SwErywXd

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks