General

  • Target

    493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535

  • Size

    681KB

  • Sample

    241110-16r33szkgm

  • MD5

    2f308bf390af28ed2b6662502058d1e2

  • SHA1

    de1bc67e7f32cfa421abd7524f4ebf5e81df93b2

  • SHA256

    493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535

  • SHA512

    30ba7c0cd6865059588011485e194edfc7ca07f0b41aefe985c62f717c8dcc7618eb50049a5b210095b3d30dd5617479c03fc2f060ea4db5003fb8a419735040

  • SSDEEP

    12288:sMrSy90teupiM/zXfoc9wq2I3nEgP4E3ynD8EUZD7QODHVRrW:myAe5MbXgcWyBP1ZEID7QSfW

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535

    • Size

      681KB

    • MD5

      2f308bf390af28ed2b6662502058d1e2

    • SHA1

      de1bc67e7f32cfa421abd7524f4ebf5e81df93b2

    • SHA256

      493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535

    • SHA512

      30ba7c0cd6865059588011485e194edfc7ca07f0b41aefe985c62f717c8dcc7618eb50049a5b210095b3d30dd5617479c03fc2f060ea4db5003fb8a419735040

    • SSDEEP

      12288:sMrSy90teupiM/zXfoc9wq2I3nEgP4E3ynD8EUZD7QODHVRrW:myAe5MbXgcWyBP1ZEID7QSfW

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks