General

  • Target

    dae8677f88824e370213d688e0047ff32436c503f230d23e94164f4d84538f91

  • Size

    479KB

  • Sample

    241110-3kypvaxdqn

  • MD5

    6c9ef6b2dfa3cd1fca9d546791c77457

  • SHA1

    5603b22c3b031a539bc8011b94d0a973aa21c12d

  • SHA256

    dae8677f88824e370213d688e0047ff32436c503f230d23e94164f4d84538f91

  • SHA512

    80e6edc7468b74bb869de475b394c3f6ca8c626e6b959dec77dda628bcd602053da06ec7483602ea6b1bf2b686ce2e348f24a11a04a35687455522c1ab035566

  • SSDEEP

    12288:jMr1y90pUt43ti5c1u31kTgjRQ6aIXXv4tl8zyOBufn:eyqO8IXWTK5Qt3OBe

Malware Config

Extracted

Family

redline

Botnet

morty

C2

217.196.96.101:4132

Attributes
  • auth_value

    fe1a24c211cc8e5bf9ff11c737ce0e97

Targets

    • Target

      dae8677f88824e370213d688e0047ff32436c503f230d23e94164f4d84538f91

    • Size

      479KB

    • MD5

      6c9ef6b2dfa3cd1fca9d546791c77457

    • SHA1

      5603b22c3b031a539bc8011b94d0a973aa21c12d

    • SHA256

      dae8677f88824e370213d688e0047ff32436c503f230d23e94164f4d84538f91

    • SHA512

      80e6edc7468b74bb869de475b394c3f6ca8c626e6b959dec77dda628bcd602053da06ec7483602ea6b1bf2b686ce2e348f24a11a04a35687455522c1ab035566

    • SSDEEP

      12288:jMr1y90pUt43ti5c1u31kTgjRQ6aIXXv4tl8zyOBufn:eyqO8IXWTK5Qt3OBe

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks