General

  • Target

    35696732147b71881b7922d1d3d951332b9c4371a70e9341814d89dc58517b64

  • Size

    545KB

  • Sample

    241110-3qm6as1jfn

  • MD5

    eb1d4d53e116d5c067bb6ba2745ff193

  • SHA1

    e1628c79abe41d32321d7308daff8ebb566ffb64

  • SHA256

    35696732147b71881b7922d1d3d951332b9c4371a70e9341814d89dc58517b64

  • SHA512

    6a00994804f37908fbd067763e7d6d3a7ca6d0c167d48b4517338fd4e653d2672e36b955b9bf643c900a11d36eb374a1d9e60f961f12edc030d0cc2c0ba63ad9

  • SSDEEP

    6144:Kny+bnr+op0yN90QE5MoDFpp4INo9bjFQAdmTb4IhU/B9jQ03ChgsFkKPWtdZOlw:ZMr4y90AyHejC5m9kcCxFXPWtUl0HGU

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Targets

    • Target

      35696732147b71881b7922d1d3d951332b9c4371a70e9341814d89dc58517b64

    • Size

      545KB

    • MD5

      eb1d4d53e116d5c067bb6ba2745ff193

    • SHA1

      e1628c79abe41d32321d7308daff8ebb566ffb64

    • SHA256

      35696732147b71881b7922d1d3d951332b9c4371a70e9341814d89dc58517b64

    • SHA512

      6a00994804f37908fbd067763e7d6d3a7ca6d0c167d48b4517338fd4e653d2672e36b955b9bf643c900a11d36eb374a1d9e60f961f12edc030d0cc2c0ba63ad9

    • SSDEEP

      6144:Kny+bnr+op0yN90QE5MoDFpp4INo9bjFQAdmTb4IhU/B9jQ03ChgsFkKPWtdZOlw:ZMr4y90AyHejC5m9kcCxFXPWtUl0HGU

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks