General

  • Target

    2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258

  • Size

    536KB

  • Sample

    241110-1sektsyqep

  • MD5

    5768d3ed26ff86e6aa2b36fb701bc4c2

  • SHA1

    d2393e778bcb4e54b2e23b15bf30a535189579a1

  • SHA256

    2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258

  • SHA512

    7c0659b001b79e6d68797857e12b68b7908d558a774b857f48c33dfc80dde26d504d17710d234d660407ea413bd03cde3696475c5165ae125d054bb2390c83ff

  • SSDEEP

    12288:hMrEy90ByzPxkbr63cEVdLVadIk1twNlDYK4xYcbUOwSzfuGZ3J9h86EXu:9yHP+br63ckdLgdIk07YdycbOGZ3h

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258

    • Size

      536KB

    • MD5

      5768d3ed26ff86e6aa2b36fb701bc4c2

    • SHA1

      d2393e778bcb4e54b2e23b15bf30a535189579a1

    • SHA256

      2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258

    • SHA512

      7c0659b001b79e6d68797857e12b68b7908d558a774b857f48c33dfc80dde26d504d17710d234d660407ea413bd03cde3696475c5165ae125d054bb2390c83ff

    • SSDEEP

      12288:hMrEy90ByzPxkbr63cEVdLVadIk1twNlDYK4xYcbUOwSzfuGZ3J9h86EXu:9yHP+br63ckdLgdIk07YdycbOGZ3h

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks