General

  • Target

    3a6b30f0a1e2da1e021c2b39ffba7bf91e5df8064a31e3a2f1bf13833ca32fdaN

  • Size

    405KB

  • Sample

    241110-3wm3gsxkhz

  • MD5

    448c668de1dbb7df05a4c0b81633c760

  • SHA1

    538791b90796a1f2ed0eb6879f80919391f19021

  • SHA256

    3a6b30f0a1e2da1e021c2b39ffba7bf91e5df8064a31e3a2f1bf13833ca32fda

  • SHA512

    d763b9d8ced2233510ce074a365c2f5496e51656ce633a17a4c000755c891262d51d389319707b7013bcaf2883490ce51aa7106f79815fcb566c0b6627cf56ee

  • SSDEEP

    6144:KIy+bnr+pp0yN90QELT2fz2UunZzFBkd7OCvstsJiptFym3MMykOQtoTij2W:UMrhy90aAFFO5nkSye6Zymou

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Targets

    • Target

      3a6b30f0a1e2da1e021c2b39ffba7bf91e5df8064a31e3a2f1bf13833ca32fdaN

    • Size

      405KB

    • MD5

      448c668de1dbb7df05a4c0b81633c760

    • SHA1

      538791b90796a1f2ed0eb6879f80919391f19021

    • SHA256

      3a6b30f0a1e2da1e021c2b39ffba7bf91e5df8064a31e3a2f1bf13833ca32fda

    • SHA512

      d763b9d8ced2233510ce074a365c2f5496e51656ce633a17a4c000755c891262d51d389319707b7013bcaf2883490ce51aa7106f79815fcb566c0b6627cf56ee

    • SSDEEP

      6144:KIy+bnr+pp0yN90QELT2fz2UunZzFBkd7OCvstsJiptFym3MMykOQtoTij2W:UMrhy90aAFFO5nkSye6Zymou

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks