General

  • Target

    3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee

  • Size

    550KB

  • Sample

    241104-rpxgsszqdw

  • MD5

    b3eaa7306d7a80b3b41dfda3aab9c97e

  • SHA1

    223741db58ef3bf4f82d961d2e9ec688f4435856

  • SHA256

    3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee

  • SHA512

    dddb1228c1ccb86f7e4f9db3d41e3d8a3704bfb9faf3115136716f6f3cde965538650ad206cb0cd19de59b4a2bf542e6cb71c39cf6c44f4111cbcc52cfa2e777

  • SSDEEP

    12288:nMrEy90zx4yi5Kud0jXnv8FzphtckFj86mbTarG:Hy89iajXv8Fz6/6ma6

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Targets

    • Target

      3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee

    • Size

      550KB

    • MD5

      b3eaa7306d7a80b3b41dfda3aab9c97e

    • SHA1

      223741db58ef3bf4f82d961d2e9ec688f4435856

    • SHA256

      3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee

    • SHA512

      dddb1228c1ccb86f7e4f9db3d41e3d8a3704bfb9faf3115136716f6f3cde965538650ad206cb0cd19de59b4a2bf542e6cb71c39cf6c44f4111cbcc52cfa2e777

    • SSDEEP

      12288:nMrEy90zx4yi5Kud0jXnv8FzphtckFj86mbTarG:Hy89iajXv8Fz6/6ma6

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks