General

  • Target

    2d3c174563a5657e25737a228ba313f3f7602f65adb1a2506f5b4bf7433b616e

  • Size

    1005KB

  • Sample

    241109-gt11nsyhrj

  • MD5

    9ce451537135de1aca37dd0a74935dcd

  • SHA1

    3afede24e8c651eff921bb8813fd09a939cc0b2a

  • SHA256

    2d3c174563a5657e25737a228ba313f3f7602f65adb1a2506f5b4bf7433b616e

  • SHA512

    8802c04362a0a1d60666d4bd19ac60f26f0dbcd282d7021b7a393733d75607390d12e8f90cce5c0d361716b35b25a6ab7d73a55c8fe22d8fb9840b736c0ed4df

  • SSDEEP

    24576:kybvmv8/JcYDcCNrwebxx9ZEcB2DMT/v4d:zV/JcScGws7Vzv

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Targets

    • Target

      2d3c174563a5657e25737a228ba313f3f7602f65adb1a2506f5b4bf7433b616e

    • Size

      1005KB

    • MD5

      9ce451537135de1aca37dd0a74935dcd

    • SHA1

      3afede24e8c651eff921bb8813fd09a939cc0b2a

    • SHA256

      2d3c174563a5657e25737a228ba313f3f7602f65adb1a2506f5b4bf7433b616e

    • SHA512

      8802c04362a0a1d60666d4bd19ac60f26f0dbcd282d7021b7a393733d75607390d12e8f90cce5c0d361716b35b25a6ab7d73a55c8fe22d8fb9840b736c0ed4df

    • SSDEEP

      24576:kybvmv8/JcYDcCNrwebxx9ZEcB2DMT/v4d:zV/JcScGws7Vzv

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks