General

  • Target

    42470db9f3e7a3ab625282e235519b7f80bb4cf59f1ec541edb258432b1527d0

  • Size

    1.2MB

  • Sample

    241110-18dngawfpr

  • MD5

    cf5c4a1065b38a43021222c4e9e714dc

  • SHA1

    dc7d686a616e426087e24d17ed7b0b4215a6f8c6

  • SHA256

    42470db9f3e7a3ab625282e235519b7f80bb4cf59f1ec541edb258432b1527d0

  • SHA512

    c576b122be3a1dbe7b5a70ecb86a96c4ba2dc5f63fb3a9df112ce848e71342ac88d3c2b00c777ce8f52eda2e1f5c91f3fff95e2f1755460190417ed00a7e469a

  • SSDEEP

    24576:kygfUzIksqG+hV1zT/yx6NABN80uIp2KtbJoXqYq:z1IxSVtg6+BNnVbJoXt

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      42470db9f3e7a3ab625282e235519b7f80bb4cf59f1ec541edb258432b1527d0

    • Size

      1.2MB

    • MD5

      cf5c4a1065b38a43021222c4e9e714dc

    • SHA1

      dc7d686a616e426087e24d17ed7b0b4215a6f8c6

    • SHA256

      42470db9f3e7a3ab625282e235519b7f80bb4cf59f1ec541edb258432b1527d0

    • SHA512

      c576b122be3a1dbe7b5a70ecb86a96c4ba2dc5f63fb3a9df112ce848e71342ac88d3c2b00c777ce8f52eda2e1f5c91f3fff95e2f1755460190417ed00a7e469a

    • SSDEEP

      24576:kygfUzIksqG+hV1zT/yx6NABN80uIp2KtbJoXqYq:z1IxSVtg6+BNnVbJoXt

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks