General

  • Target

    578f99fc07e1da99ed56af076bf0616c4e79676f563948e0735373a677e225e1

  • Size

    479KB

  • Sample

    241109-tg1klawpf1

  • MD5

    7e1ced01148b1743ae02f48d9d05f5e6

  • SHA1

    6817c59c3e9a5bb05f014603f1b717b23db73310

  • SHA256

    578f99fc07e1da99ed56af076bf0616c4e79676f563948e0735373a677e225e1

  • SHA512

    4bc4749a231ba0ac537e30e6c6e6fbe2500d0112673d8f09090f8ee6bbab505dc575bb1e713da2d5876deea6d48e1727d3363558c4dbe898513fd18ac5fd138e

  • SSDEEP

    12288:3MrEy90LNiwiF0Qx7ops1VgarKq6OvmA3xD0Dl8:byEkwK1hoAOIKUmA3x68

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      578f99fc07e1da99ed56af076bf0616c4e79676f563948e0735373a677e225e1

    • Size

      479KB

    • MD5

      7e1ced01148b1743ae02f48d9d05f5e6

    • SHA1

      6817c59c3e9a5bb05f014603f1b717b23db73310

    • SHA256

      578f99fc07e1da99ed56af076bf0616c4e79676f563948e0735373a677e225e1

    • SHA512

      4bc4749a231ba0ac537e30e6c6e6fbe2500d0112673d8f09090f8ee6bbab505dc575bb1e713da2d5876deea6d48e1727d3363558c4dbe898513fd18ac5fd138e

    • SSDEEP

      12288:3MrEy90LNiwiF0Qx7ops1VgarKq6OvmA3xD0Dl8:byEkwK1hoAOIKUmA3x68

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks