General

  • Target

    4583dbfbe17cd79823999a1110438cfd5f1da2199ab5769fb5fd5e0c347c1111

  • Size

    192KB

  • Sample

    241110-3h6bxaxgja

  • MD5

    2fd9225d8a3166e1ec355ca1c50e4c3f

  • SHA1

    b3b82e1c236a938e6435d38e4c87fb6e0c90ec60

  • SHA256

    4583dbfbe17cd79823999a1110438cfd5f1da2199ab5769fb5fd5e0c347c1111

  • SHA512

    ebca82ef548c0213faf87e1074bb39b8a66c39396556546f6272eb7cbae51d3a86fbfd2eb4a5851871ed4f0867a952b53154fcfa3f57938d94a2f92f35c2ec65

  • SSDEEP

    3072:KNy+bnr+O1X5GWp1icKAArDZz4N9GhbkrNEk1OTEqTuBppc2Fro7:KNy+bnr+Ep0yN90QE/6BrhK

Malware Config

Extracted

Family

redline

Botnet

polo

C2

193.233.20.31:4125

Attributes
  • auth_value

    f1a1b1041a864e0f1f788d42ececa8b3

Targets

    • Target

      4583dbfbe17cd79823999a1110438cfd5f1da2199ab5769fb5fd5e0c347c1111

    • Size

      192KB

    • MD5

      2fd9225d8a3166e1ec355ca1c50e4c3f

    • SHA1

      b3b82e1c236a938e6435d38e4c87fb6e0c90ec60

    • SHA256

      4583dbfbe17cd79823999a1110438cfd5f1da2199ab5769fb5fd5e0c347c1111

    • SHA512

      ebca82ef548c0213faf87e1074bb39b8a66c39396556546f6272eb7cbae51d3a86fbfd2eb4a5851871ed4f0867a952b53154fcfa3f57938d94a2f92f35c2ec65

    • SSDEEP

      3072:KNy+bnr+O1X5GWp1icKAArDZz4N9GhbkrNEk1OTEqTuBppc2Fro7:KNy+bnr+Ep0yN90QE/6BrhK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks