General

  • Target

    b7ceb34bba631c55fc7188814711ea344799c43833aae8df15ad1b094d7909a7

  • Size

    1.1MB

  • Sample

    241110-1lvcpsypdl

  • MD5

    fd2a2a02a8f51064bf75d6c3d5254a96

  • SHA1

    d2a4f30034e3648959fbc6855fcceefec7c21ba8

  • SHA256

    b7ceb34bba631c55fc7188814711ea344799c43833aae8df15ad1b094d7909a7

  • SHA512

    55403bae85dedd0df76f9881ecde8910acd8884bbd098e0ef905644bc6e87cd990301474017a135ad5559add6bf14127645043db72b3d544260bc5a7836b17de

  • SSDEEP

    24576:9y1zcm3LXmVIq1o9aujaFx/h+ALoTfiAYwkqTj:Y1z93LXwI9aujaHYfiAY0

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      b7ceb34bba631c55fc7188814711ea344799c43833aae8df15ad1b094d7909a7

    • Size

      1.1MB

    • MD5

      fd2a2a02a8f51064bf75d6c3d5254a96

    • SHA1

      d2a4f30034e3648959fbc6855fcceefec7c21ba8

    • SHA256

      b7ceb34bba631c55fc7188814711ea344799c43833aae8df15ad1b094d7909a7

    • SHA512

      55403bae85dedd0df76f9881ecde8910acd8884bbd098e0ef905644bc6e87cd990301474017a135ad5559add6bf14127645043db72b3d544260bc5a7836b17de

    • SSDEEP

      24576:9y1zcm3LXmVIq1o9aujaFx/h+ALoTfiAYwkqTj:Y1z93LXwI9aujaHYfiAY0

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks