General

  • Target

    0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93

  • Size

    1.1MB

  • Sample

    241110-3lmnzazrgm

  • MD5

    a576820e07ff80e5c97fed10f147945e

  • SHA1

    93eaba624efbbaad1a990fa596752b72531209b7

  • SHA256

    0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93

  • SHA512

    a66a2b69f2adf81ce506529768737250eee99409ff290f4be1b663e3aeef9be266ac291ad9d7f91a371e6948a07e323dbc431f979ecb525cc81b6eb19200cddb

  • SSDEEP

    24576:zylkV/UyGb+HFSOwvRYRm9YD4pWO8rgkFwmr5NEBJuOfKd2:Ga52aHFSCZDKWOaVfEBJuoKd

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93

    • Size

      1.1MB

    • MD5

      a576820e07ff80e5c97fed10f147945e

    • SHA1

      93eaba624efbbaad1a990fa596752b72531209b7

    • SHA256

      0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93

    • SHA512

      a66a2b69f2adf81ce506529768737250eee99409ff290f4be1b663e3aeef9be266ac291ad9d7f91a371e6948a07e323dbc431f979ecb525cc81b6eb19200cddb

    • SSDEEP

      24576:zylkV/UyGb+HFSOwvRYRm9YD4pWO8rgkFwmr5NEBJuOfKd2:Ga52aHFSCZDKWOaVfEBJuoKd

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks