General

  • Target

    18830b4174ba621190c622f8ec8e148178b3e6e2afab7aa143992a0ff903d976

  • Size

    695KB

  • Sample

    241105-p79hza1jhz

  • MD5

    6b301f849a4b48eddaa3e9e6d370b7ad

  • SHA1

    2028501f9ef0325d24cc2bab4615a776f057c36b

  • SHA256

    18830b4174ba621190c622f8ec8e148178b3e6e2afab7aa143992a0ff903d976

  • SHA512

    cddfea831a5667763c24abde2bfc0e0252d301aefea6765ed4e592efc7c19173c17242e1bb91b1a0e7aa85d81a3dbe82c8cadc2e1c7417e2dcd4c5caa106e1b5

  • SSDEEP

    12288:j+8WwCCP8n/rwdMY4E6MyHRDgqWBtoT5/bDsyscsbiSZPCK9T9LHEdp0:jEwI/Ub4eAdgqWBteDsyhSZPCoTydp0

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      202e690447812603792d0a7bebc2657f724623bbbc418e35805fdbc975397120.exe

    • Size

      738KB

    • MD5

      7a86c899903d0a6dc4d85a577434c6db

    • SHA1

      101534da15517334cd02368e0282aef11d368a7e

    • SHA256

      202e690447812603792d0a7bebc2657f724623bbbc418e35805fdbc975397120

    • SHA512

      8e0cb4f764c37bc0846c193931790036b2cfb9928d34fccb69be7152ee89cdee2ab2642091be31c15c66d7fdd2d9e45c5525774022fb1052512972b04fc66b7c

    • SSDEEP

      12288:4MrHy90+FrUG3YB60FXccGjC3AM1DuWvk6V/2MNY2S0S0obzeG15Mo3DQCotd71V:fyLALIFcRW58VS0KbzLPzQCyci

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks