General

  • Target

    10c7b3e365efde42f07adcc2ae3982cefe0f3beace85d7ccb5244958317e5ed9

  • Size

    933KB

  • Sample

    241110-11p2jawjgt

  • MD5

    7c87f3bc95e9a73fda4364671b6ca00b

  • SHA1

    ad0d0b9d08e0f52fcc99cf4091bfc005c0be7221

  • SHA256

    10c7b3e365efde42f07adcc2ae3982cefe0f3beace85d7ccb5244958317e5ed9

  • SHA512

    73fe49c41aa00ac5cd6d32cd2b4ce85e338a5354f84a29d4c94b1429eb68941d6b04b7eb92db6ef3141274c7314ebef6435dd0749a85715ca1dbe6d723fb080f

  • SSDEEP

    24576:Gysb36TQNliW02DNOWjOQKiBZA91FSkjaGNLz8CgJ:Vsb3myliVG0WjOli3AvFfjLNng

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Targets

    • Target

      10c7b3e365efde42f07adcc2ae3982cefe0f3beace85d7ccb5244958317e5ed9

    • Size

      933KB

    • MD5

      7c87f3bc95e9a73fda4364671b6ca00b

    • SHA1

      ad0d0b9d08e0f52fcc99cf4091bfc005c0be7221

    • SHA256

      10c7b3e365efde42f07adcc2ae3982cefe0f3beace85d7ccb5244958317e5ed9

    • SHA512

      73fe49c41aa00ac5cd6d32cd2b4ce85e338a5354f84a29d4c94b1429eb68941d6b04b7eb92db6ef3141274c7314ebef6435dd0749a85715ca1dbe6d723fb080f

    • SSDEEP

      24576:Gysb36TQNliW02DNOWjOQKiBZA91FSkjaGNLz8CgJ:Vsb3myliVG0WjOli3AvFfjLNng

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks