General

  • Target

    939e8bed11b8a4299929a9a2295d5bbfb164d01377417806df00da47231cd636

  • Size

    753KB

  • Sample

    241108-rrp6hateng

  • MD5

    ed0d8f252ccabc90f9d8992300c552cb

  • SHA1

    f5d5bf192a38a9b53c185af3ce9458cadf8192ee

  • SHA256

    939e8bed11b8a4299929a9a2295d5bbfb164d01377417806df00da47231cd636

  • SHA512

    db60319d2fe0a510afd0a119ce61fea2b3c4f534c6e3ee00a779feab2e8fdf012b2f2a6da227cb3c806adb01d0421b61e67439e0169afd787b3898282c5a0df6

  • SSDEEP

    12288:KMr+y90Lh1iXQ88bIcPPfh+ByJbNArfQaE8zSf/ctA/+yfabegyqPGrD:oyKDigcc4BRrfQtf5/1qegyyGrD

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      939e8bed11b8a4299929a9a2295d5bbfb164d01377417806df00da47231cd636

    • Size

      753KB

    • MD5

      ed0d8f252ccabc90f9d8992300c552cb

    • SHA1

      f5d5bf192a38a9b53c185af3ce9458cadf8192ee

    • SHA256

      939e8bed11b8a4299929a9a2295d5bbfb164d01377417806df00da47231cd636

    • SHA512

      db60319d2fe0a510afd0a119ce61fea2b3c4f534c6e3ee00a779feab2e8fdf012b2f2a6da227cb3c806adb01d0421b61e67439e0169afd787b3898282c5a0df6

    • SSDEEP

      12288:KMr+y90Lh1iXQ88bIcPPfh+ByJbNArfQaE8zSf/ctA/+yfabegyqPGrD:oyKDigcc4BRrfQtf5/1qegyyGrD

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks