General

  • Target

    8a9538e899a5ac6f937311033ef3136fa8dc855ab4e9056e94ac485d41a6d063

  • Size

    569KB

  • Sample

    241110-19z8vszldm

  • MD5

    1fe53f9f8e48fda2cf996ab059a81d7f

  • SHA1

    d8d286ce3a9e9f33cbc3b84d2af84c01f0e560ca

  • SHA256

    8a9538e899a5ac6f937311033ef3136fa8dc855ab4e9056e94ac485d41a6d063

  • SHA512

    785b712dcf6a552a7cfb078a2c710d4faae7b3bcf917161e729cbc81a17d722195f2543a43dd179f98d73a1df037d807ed09209f0e8bd34100147969a456b541

  • SSDEEP

    12288:8Mriy90xahimz7AuxqVeQBwi1NRe9MNBsHhU:uyEsVAuxYpwis9Ml

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      8a9538e899a5ac6f937311033ef3136fa8dc855ab4e9056e94ac485d41a6d063

    • Size

      569KB

    • MD5

      1fe53f9f8e48fda2cf996ab059a81d7f

    • SHA1

      d8d286ce3a9e9f33cbc3b84d2af84c01f0e560ca

    • SHA256

      8a9538e899a5ac6f937311033ef3136fa8dc855ab4e9056e94ac485d41a6d063

    • SHA512

      785b712dcf6a552a7cfb078a2c710d4faae7b3bcf917161e729cbc81a17d722195f2543a43dd179f98d73a1df037d807ed09209f0e8bd34100147969a456b541

    • SSDEEP

      12288:8Mriy90xahimz7AuxqVeQBwi1NRe9MNBsHhU:uyEsVAuxYpwis9Ml

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks