General

  • Target

    32441f1b80a7549954c69c2f055e9a230458cf46cccd6d67a955c883fc4127d4

  • Size

    547KB

  • Sample

    241110-19544swlet

  • MD5

    f52253cf8bcc624ccf2d08e6ebe835b1

  • SHA1

    96fd493db364e54edae4109f059e88ca33d96ba3

  • SHA256

    32441f1b80a7549954c69c2f055e9a230458cf46cccd6d67a955c883fc4127d4

  • SHA512

    e7c857a9dcabefb9314bb4455f3b45c474f8b321ce0058cd6fac0f6cc9976ef5de531c8bb1aafc31e879084f6104f834f476c28f88146aac84e5c3d251d2d5b9

  • SSDEEP

    12288:lMrry90oQX0VMV9pfU5jWbtU+MCP5w0sZiB3W/RzW:yyJVGjfU5jyq+vGR//Rq

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      32441f1b80a7549954c69c2f055e9a230458cf46cccd6d67a955c883fc4127d4

    • Size

      547KB

    • MD5

      f52253cf8bcc624ccf2d08e6ebe835b1

    • SHA1

      96fd493db364e54edae4109f059e88ca33d96ba3

    • SHA256

      32441f1b80a7549954c69c2f055e9a230458cf46cccd6d67a955c883fc4127d4

    • SHA512

      e7c857a9dcabefb9314bb4455f3b45c474f8b321ce0058cd6fac0f6cc9976ef5de531c8bb1aafc31e879084f6104f834f476c28f88146aac84e5c3d251d2d5b9

    • SSDEEP

      12288:lMrry90oQX0VMV9pfU5jWbtU+MCP5w0sZiB3W/RzW:yyJVGjfU5jyq+vGR//Rq

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks