General

  • Target

    15e3a1ea5a177efbc41be5a065b01e119751ecc2a0928a28cf32db7fa61ab398

  • Size

    532KB

  • Sample

    241110-3lrypawrh1

  • MD5

    b01c44461aaa156580084046ac2ce7bf

  • SHA1

    4284c4accf4846d231726e2c3f9e0d39b1e5359b

  • SHA256

    15e3a1ea5a177efbc41be5a065b01e119751ecc2a0928a28cf32db7fa61ab398

  • SHA512

    67e1e8ed01317507711cf079470665c687ee43658725f2de829c4fdc170abe6b92c03084f51fdf970a6438201d4b4b75c62fc62854b459a17824a0ee3b508d88

  • SSDEEP

    12288:9MrXy90AjQSLPScMP4c3EYjoCOuSs+mPNgLVHK:2yJUS8P4c3EYj3PgLVHK

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      15e3a1ea5a177efbc41be5a065b01e119751ecc2a0928a28cf32db7fa61ab398

    • Size

      532KB

    • MD5

      b01c44461aaa156580084046ac2ce7bf

    • SHA1

      4284c4accf4846d231726e2c3f9e0d39b1e5359b

    • SHA256

      15e3a1ea5a177efbc41be5a065b01e119751ecc2a0928a28cf32db7fa61ab398

    • SHA512

      67e1e8ed01317507711cf079470665c687ee43658725f2de829c4fdc170abe6b92c03084f51fdf970a6438201d4b4b75c62fc62854b459a17824a0ee3b508d88

    • SSDEEP

      12288:9MrXy90AjQSLPScMP4c3EYjoCOuSs+mPNgLVHK:2yJUS8P4c3EYj3PgLVHK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks