General

  • Target

    8fbecdcea30d70b94ff0dc4150ae37d3e6c2bdbc001b3d613bcc008330cdcdc1

  • Size

    479KB

  • Sample

    241110-3fe2yaxfna

  • MD5

    00c364ce47fd725488e145aad77bdbc7

  • SHA1

    8389e00c9e4bba8fce1f31891647631a7465538e

  • SHA256

    8fbecdcea30d70b94ff0dc4150ae37d3e6c2bdbc001b3d613bcc008330cdcdc1

  • SHA512

    5eab9b5c9953423ba379db7cecf056b6ad3c55979febf5c673328b5a6ff5092f3d37bcc48accb06aaf2fca5b626253b80d421ed4d348da24a3111e590f7c56cb

  • SSDEEP

    12288:XMr/y902O34AlTUqOXw1V+ZTm6oXtF9KiP3:wyj7g+XwTUU7

Malware Config

Extracted

Family

redline

Botnet

divan

C2

217.196.96.102:4132

Attributes
  • auth_value

    b414986bebd7f5a3ec9aee0341b8e769

Targets

    • Target

      8fbecdcea30d70b94ff0dc4150ae37d3e6c2bdbc001b3d613bcc008330cdcdc1

    • Size

      479KB

    • MD5

      00c364ce47fd725488e145aad77bdbc7

    • SHA1

      8389e00c9e4bba8fce1f31891647631a7465538e

    • SHA256

      8fbecdcea30d70b94ff0dc4150ae37d3e6c2bdbc001b3d613bcc008330cdcdc1

    • SHA512

      5eab9b5c9953423ba379db7cecf056b6ad3c55979febf5c673328b5a6ff5092f3d37bcc48accb06aaf2fca5b626253b80d421ed4d348da24a3111e590f7c56cb

    • SSDEEP

      12288:XMr/y902O34AlTUqOXw1V+ZTm6oXtF9KiP3:wyj7g+XwTUU7

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks