General

  • Target

    ff907f5e7f9d0d034a752329c2424dca7fc33f8de3a29965b407940014f1751c

  • Size

    753KB

  • Sample

    241109-j5wans1dml

  • MD5

    0c829d1227b8c27668d133b64b9bf1a7

  • SHA1

    946a6eb9f3084ada59422f73c7561b52fbe38c61

  • SHA256

    ff907f5e7f9d0d034a752329c2424dca7fc33f8de3a29965b407940014f1751c

  • SHA512

    4718efa5068000936bbf8133d7123b7f6191765e63f21b971a2dcfa4ede82b7e051cffdcc65dc6a8900e4ba4fc853a1ada99e7d1c928c783f5f2a85bcb733f15

  • SSDEEP

    12288:AMrBy90MHAVit02tnnQJ/0ROPY/z9SKBeHZRCUJUes47Mj67QfQ7k:xySgttB+RASKBKBiL44jfQ7k

Malware Config

Extracted

Family

redline

Botnet

mars

C2

83.97.73.127:19045

Attributes
  • auth_value

    91bd3682cfb50cdc64b6009eb977b766

Targets

    • Target

      ff907f5e7f9d0d034a752329c2424dca7fc33f8de3a29965b407940014f1751c

    • Size

      753KB

    • MD5

      0c829d1227b8c27668d133b64b9bf1a7

    • SHA1

      946a6eb9f3084ada59422f73c7561b52fbe38c61

    • SHA256

      ff907f5e7f9d0d034a752329c2424dca7fc33f8de3a29965b407940014f1751c

    • SHA512

      4718efa5068000936bbf8133d7123b7f6191765e63f21b971a2dcfa4ede82b7e051cffdcc65dc6a8900e4ba4fc853a1ada99e7d1c928c783f5f2a85bcb733f15

    • SSDEEP

      12288:AMrBy90MHAVit02tnnQJ/0ROPY/z9SKBeHZRCUJUes47Mj67QfQ7k:xySgttB+RASKBKBiL44jfQ7k

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks