General

  • Target

    359624319378608433cc89ed7f3d12894988a7fbc74973bc834fb7ba492221c5

  • Size

    756KB

  • Sample

    241106-zfj44swqbv

  • MD5

    29a5d79e2ce18f5b55b09954d78f7c2a

  • SHA1

    7dd80ae0a72aae410f4e873d6eb0c072a18bd30d

  • SHA256

    359624319378608433cc89ed7f3d12894988a7fbc74973bc834fb7ba492221c5

  • SHA512

    ced6933f8c16e48a87c84b3cacdeb966f2e6836ea226a6992f56229f1543e4417d22f18b3c534a1ef703ee4380510f1f893bb04fde87be3ddf99d1c9138991f9

  • SSDEEP

    12288:nMrKy90mVHlBvbWA+V4rSvj3ZB8V8h8HSZ+4XP2evlQNe/5tNiJ5M+EbDjt/FJPV:ZylfGX7ZBQW8HSXP2yQe5jCm+gDxnGnQ

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      359624319378608433cc89ed7f3d12894988a7fbc74973bc834fb7ba492221c5

    • Size

      756KB

    • MD5

      29a5d79e2ce18f5b55b09954d78f7c2a

    • SHA1

      7dd80ae0a72aae410f4e873d6eb0c072a18bd30d

    • SHA256

      359624319378608433cc89ed7f3d12894988a7fbc74973bc834fb7ba492221c5

    • SHA512

      ced6933f8c16e48a87c84b3cacdeb966f2e6836ea226a6992f56229f1543e4417d22f18b3c534a1ef703ee4380510f1f893bb04fde87be3ddf99d1c9138991f9

    • SSDEEP

      12288:nMrKy90mVHlBvbWA+V4rSvj3ZB8V8h8HSZ+4XP2evlQNe/5tNiJ5M+EbDjt/FJPV:ZylfGX7ZBQW8HSXP2yQe5jCm+gDxnGnQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks