General

  • Target

    5bc5fae1095adbc05b701fa98991c3c1dde4efcbcb433516283f4badc089f161

  • Size

    1.2MB

  • Sample

    241109-zespvssaml

  • MD5

    9f2dd96857d07329f6d1e59c339a54a7

  • SHA1

    9a35438f62ca4800ffeb399d850b5230d70f29e0

  • SHA256

    5bc5fae1095adbc05b701fa98991c3c1dde4efcbcb433516283f4badc089f161

  • SHA512

    72944a7618688b031b9148c55ae4ea0075c6b6f03e313825a552b9dda12854df79c4740d22542263a3da468977819b5a9a44872da6accea414b39906ae098450

  • SSDEEP

    24576:pyVOHXKgcCKJvQR9YhM0JXm598A+Lv4gCQOsdnEvDe7:cVuX9cC4I9I+8AiSkdEb

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      5bc5fae1095adbc05b701fa98991c3c1dde4efcbcb433516283f4badc089f161

    • Size

      1.2MB

    • MD5

      9f2dd96857d07329f6d1e59c339a54a7

    • SHA1

      9a35438f62ca4800ffeb399d850b5230d70f29e0

    • SHA256

      5bc5fae1095adbc05b701fa98991c3c1dde4efcbcb433516283f4badc089f161

    • SHA512

      72944a7618688b031b9148c55ae4ea0075c6b6f03e313825a552b9dda12854df79c4740d22542263a3da468977819b5a9a44872da6accea414b39906ae098450

    • SSDEEP

      24576:pyVOHXKgcCKJvQR9YhM0JXm598A+Lv4gCQOsdnEvDe7:cVuX9cC4I9I+8AiSkdEb

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks