General

  • Target

    d49214352072f8efc1adcb6d69f6f9d21a95d6ca44dc2b957eb6574d1c70fdcb

  • Size

    479KB

  • Sample

    241110-153hesxakh

  • MD5

    533eab966c38ed8429c44f284a75172d

  • SHA1

    5d4b47b3613ab6bdd93a8f27ed01d8aed3f7c3a8

  • SHA256

    d49214352072f8efc1adcb6d69f6f9d21a95d6ca44dc2b957eb6574d1c70fdcb

  • SHA512

    e269d1c8ea46d2f0a023e8777262b4c6e46d742d1a19d503b82bf7e04b0b82ae5715118717e7ef0990dd9c024b7a0c456f4a79bf9635af57f1caf072165971cd

  • SSDEEP

    12288:VMrpy90ycCCB+4jCm7E7YQzdG9alQDM511IgIkf9:cyij84ae78

Malware Config

Extracted

Family

redline

Botnet

mufos

C2

217.196.96.102:4132

Attributes
  • auth_value

    136f202e6569ad5815c34377858a255c

Targets

    • Target

      d49214352072f8efc1adcb6d69f6f9d21a95d6ca44dc2b957eb6574d1c70fdcb

    • Size

      479KB

    • MD5

      533eab966c38ed8429c44f284a75172d

    • SHA1

      5d4b47b3613ab6bdd93a8f27ed01d8aed3f7c3a8

    • SHA256

      d49214352072f8efc1adcb6d69f6f9d21a95d6ca44dc2b957eb6574d1c70fdcb

    • SHA512

      e269d1c8ea46d2f0a023e8777262b4c6e46d742d1a19d503b82bf7e04b0b82ae5715118717e7ef0990dd9c024b7a0c456f4a79bf9635af57f1caf072165971cd

    • SSDEEP

      12288:VMrpy90ycCCB+4jCm7E7YQzdG9alQDM511IgIkf9:cyij84ae78

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks