General

  • Target

    c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b

  • Size

    1.1MB

  • Sample

    241104-rqjx4a1gjn

  • MD5

    de71c5f1a6451e3b8b1e8f321ddc98e3

  • SHA1

    f2684f1e4c9b53b28196952979179d37f2a756b0

  • SHA256

    c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b

  • SHA512

    dc2c8c4680d6d4a15d81a8bde2f40ab7061bc8ccb0d8cd3defa9a8ba20647f7a937add942761db38cf2298e53beec39a6384a70c19f0f5d7c324bd66a539f4be

  • SSDEEP

    24576:MypTyccchID79eGqzt4YzpJmknf+HJ8CdQ:7ps+ID78G8zbmknf+H1d

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b

    • Size

      1.1MB

    • MD5

      de71c5f1a6451e3b8b1e8f321ddc98e3

    • SHA1

      f2684f1e4c9b53b28196952979179d37f2a756b0

    • SHA256

      c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b

    • SHA512

      dc2c8c4680d6d4a15d81a8bde2f40ab7061bc8ccb0d8cd3defa9a8ba20647f7a937add942761db38cf2298e53beec39a6384a70c19f0f5d7c324bd66a539f4be

    • SSDEEP

      24576:MypTyccchID79eGqzt4YzpJmknf+HJ8CdQ:7ps+ID78G8zbmknf+H1d

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks