General

  • Target

    7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45

  • Size

    481KB

  • Sample

    241110-1zc1kswhkf

  • MD5

    a43340ee16566b82a02b386a990303c3

  • SHA1

    8c3b595315c3ede1a6af09d8093f7c036d155a6c

  • SHA256

    7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45

  • SHA512

    4b975efc425b47df5a843d77a0fc15d4227714fe013701859b0391579624be7644e9fb0602ca67fb4a968c9d1ee51e264ea9480066439dff8a195239616f006a

  • SSDEEP

    12288:OMrby900pp67Odct74P48cguqmhC+OZ2xAc1:NyJiYc1SjRuqmsV4X

Malware Config

Extracted

Family

redline

Botnet

mihan

C2

217.196.96.101:4132

Attributes
  • auth_value

    9a6a8fdae02ed7caa0a49a6ddc6d4520

Targets

    • Target

      7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45

    • Size

      481KB

    • MD5

      a43340ee16566b82a02b386a990303c3

    • SHA1

      8c3b595315c3ede1a6af09d8093f7c036d155a6c

    • SHA256

      7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45

    • SHA512

      4b975efc425b47df5a843d77a0fc15d4227714fe013701859b0391579624be7644e9fb0602ca67fb4a968c9d1ee51e264ea9480066439dff8a195239616f006a

    • SSDEEP

      12288:OMrby900pp67Odct74P48cguqmhC+OZ2xAc1:NyJiYc1SjRuqmsV4X

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks