General

  • Target

    1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25

  • Size

    873KB

  • Sample

    241107-k8ac2synfs

  • MD5

    4300f8bc621a3afcb9442a5c866fbc75

  • SHA1

    3921a76e6971773c38145c1454847c7fd8cf20f0

  • SHA256

    1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25

  • SHA512

    a93fed1b66cd0e903fd9d0363dcd8ef9b84af4cf9c79c17dd260574077306697b86271c975e1d66c6e4bc12c5b6423bd2b92f3cc6b11276c4ec5707a4ae722a2

  • SSDEEP

    24576:TycPs6HJm3H6iA7IpSoY/29knp9lY58UZlKQxNmp73g:mZMEJB9Up9lclKQxQp7

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.122:19062

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25

    • Size

      873KB

    • MD5

      4300f8bc621a3afcb9442a5c866fbc75

    • SHA1

      3921a76e6971773c38145c1454847c7fd8cf20f0

    • SHA256

      1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25

    • SHA512

      a93fed1b66cd0e903fd9d0363dcd8ef9b84af4cf9c79c17dd260574077306697b86271c975e1d66c6e4bc12c5b6423bd2b92f3cc6b11276c4ec5707a4ae722a2

    • SSDEEP

      24576:TycPs6HJm3H6iA7IpSoY/29knp9lY58UZlKQxNmp73g:mZMEJB9Up9lclKQxQp7

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks