General

  • Target

    b5bfd712afa58078e0f9b15596833a36bd9757fba30439c8dd9808c8a3c07be1

  • Size

    531KB

  • Sample

    241110-1vadwsyram

  • MD5

    185b512567d22f2540c127d1094628cf

  • SHA1

    7fce5805dff0d3d8de2726b3cd5d0a32275067d9

  • SHA256

    b5bfd712afa58078e0f9b15596833a36bd9757fba30439c8dd9808c8a3c07be1

  • SHA512

    dc9d6d6605d63cb177004f674dfe36b4ca367a9855414034a0dada31360add352317de0201991dfa80af73c03b5157aa6adc993712c234ed6d4f253840df4f36

  • SSDEEP

    12288:EMrOy90YvunAvDCfLTEvSxpn0fnJITBdqq/2mUXl1r73:iyDvWEDZPfJydp/2V3H3

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Targets

    • Target

      b5bfd712afa58078e0f9b15596833a36bd9757fba30439c8dd9808c8a3c07be1

    • Size

      531KB

    • MD5

      185b512567d22f2540c127d1094628cf

    • SHA1

      7fce5805dff0d3d8de2726b3cd5d0a32275067d9

    • SHA256

      b5bfd712afa58078e0f9b15596833a36bd9757fba30439c8dd9808c8a3c07be1

    • SHA512

      dc9d6d6605d63cb177004f674dfe36b4ca367a9855414034a0dada31360add352317de0201991dfa80af73c03b5157aa6adc993712c234ed6d4f253840df4f36

    • SSDEEP

      12288:EMrOy90YvunAvDCfLTEvSxpn0fnJITBdqq/2mUXl1r73:iyDvWEDZPfJydp/2V3H3

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks