General

  • Target

    0ff59be82fb8e881daba0110e9ce68423726dc64e6d4d9a28164a8205d7ce0cd.exe

  • Size

    307KB

  • Sample

    241110-2gn6kawmcw

  • MD5

    119c59f04d78ae250d3ab71dab98b908

  • SHA1

    161ca3975f3f68c7d5743a465971412087e0df10

  • SHA256

    0ff59be82fb8e881daba0110e9ce68423726dc64e6d4d9a28164a8205d7ce0cd

  • SHA512

    1b65434c42412e92d90392919ffb915d5f8c9d1f3093a6814d3c85160d61f9f691014fb799be944270557946df9ed410aeda00fac6a844aca8001eac8139037d

  • SSDEEP

    6144:K+y+bnr+wp0yN90QE85F5OYc1u31g4TByX4a1flW4aMPEsxS:aMrwy902xc1u31TTEX4YflpPHxS

Malware Config

Extracted

Family

redline

Botnet

divan

C2

217.196.96.102:4132

Attributes
  • auth_value

    b414986bebd7f5a3ec9aee0341b8e769

Targets

    • Target

      0ff59be82fb8e881daba0110e9ce68423726dc64e6d4d9a28164a8205d7ce0cd.exe

    • Size

      307KB

    • MD5

      119c59f04d78ae250d3ab71dab98b908

    • SHA1

      161ca3975f3f68c7d5743a465971412087e0df10

    • SHA256

      0ff59be82fb8e881daba0110e9ce68423726dc64e6d4d9a28164a8205d7ce0cd

    • SHA512

      1b65434c42412e92d90392919ffb915d5f8c9d1f3093a6814d3c85160d61f9f691014fb799be944270557946df9ed410aeda00fac6a844aca8001eac8139037d

    • SSDEEP

      6144:K+y+bnr+wp0yN90QE85F5OYc1u31g4TByX4a1flW4aMPEsxS:aMrwy902xc1u31TTEX4YflpPHxS

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks