General

  • Target

    354cbe1c5ee8b735928549c23900ce810c8b9055e79d007d1af94ce65f246251

  • Size

    755KB

  • Sample

    241105-2x4aestjcj

  • MD5

    c497422905c24c186099ba80e6c2cde8

  • SHA1

    af5c416e4140c05b2f59d3dd51420667ae36d917

  • SHA256

    354cbe1c5ee8b735928549c23900ce810c8b9055e79d007d1af94ce65f246251

  • SHA512

    e72d09fe9f0b27cf3aff56962b60d441e1c033f872520b9d0adaf92c1a01a5feb0acb891afa3f88a6e41e9b5eb6e4883f366bee2d66863949e12c51b50cb9695

  • SSDEEP

    12288:pMrby90ef2+7cLtwD/7y+dy/BK0kHY7sopLJdmtjA0oPJ7Sa/4dVmVhQCwaVkY:2y7XIOrnGrkHibZWt806J7SaAdYVyCwI

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      354cbe1c5ee8b735928549c23900ce810c8b9055e79d007d1af94ce65f246251

    • Size

      755KB

    • MD5

      c497422905c24c186099ba80e6c2cde8

    • SHA1

      af5c416e4140c05b2f59d3dd51420667ae36d917

    • SHA256

      354cbe1c5ee8b735928549c23900ce810c8b9055e79d007d1af94ce65f246251

    • SHA512

      e72d09fe9f0b27cf3aff56962b60d441e1c033f872520b9d0adaf92c1a01a5feb0acb891afa3f88a6e41e9b5eb6e4883f366bee2d66863949e12c51b50cb9695

    • SSDEEP

      12288:pMrby90ef2+7cLtwD/7y+dy/BK0kHY7sopLJdmtjA0oPJ7Sa/4dVmVhQCwaVkY:2y7XIOrnGrkHibZWt806J7SaAdYVyCwI

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks