General

  • Target

    80882049def5cbcc3d85e87ec5f4370d2e25a87d6fc8e3129bf98cdb96c0f88b

  • Size

    730KB

  • Sample

    241108-y53r3s1phr

  • MD5

    cb594992778ee446cb4dd8e0f88a1746

  • SHA1

    69e8b8e1ff45cd6e7d926d10bbc02b6c93b8dc8d

  • SHA256

    80882049def5cbcc3d85e87ec5f4370d2e25a87d6fc8e3129bf98cdb96c0f88b

  • SHA512

    10e2510cf4db77cd098aa558ba4a1dec5a0dae969cc211c503fa0cbbded2ce5a010e4daa3140bedc2516427fdf918e7bd108925d5fdfa97991729405d5b394dd

  • SSDEEP

    12288:lMriy90lSpoWn77cP53KGvDIwEOswU8J212xoGdXvxl0bdE24iwXlWrIdAy1Q4jf:3yjpLuDIqsf8JBoiXv4IXddj66

Malware Config

Extracted

Family

redline

Botnet

mars

C2

83.97.73.127:19045

Attributes
  • auth_value

    91bd3682cfb50cdc64b6009eb977b766

Targets

    • Target

      80882049def5cbcc3d85e87ec5f4370d2e25a87d6fc8e3129bf98cdb96c0f88b

    • Size

      730KB

    • MD5

      cb594992778ee446cb4dd8e0f88a1746

    • SHA1

      69e8b8e1ff45cd6e7d926d10bbc02b6c93b8dc8d

    • SHA256

      80882049def5cbcc3d85e87ec5f4370d2e25a87d6fc8e3129bf98cdb96c0f88b

    • SHA512

      10e2510cf4db77cd098aa558ba4a1dec5a0dae969cc211c503fa0cbbded2ce5a010e4daa3140bedc2516427fdf918e7bd108925d5fdfa97991729405d5b394dd

    • SSDEEP

      12288:lMriy90lSpoWn77cP53KGvDIwEOswU8J212xoGdXvxl0bdE24iwXlWrIdAy1Q4jf:3yjpLuDIqsf8JBoiXv4IXddj66

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks