General

  • Target

    3368bf65527ab75cbc7d1ae545e4f9582ece0dfaef6cec4c88fd6725a3f8b069

  • Size

    906KB

  • Sample

    241110-clv28szngk

  • MD5

    1e145a64f67aee535bc77a6559a6d5a3

  • SHA1

    77bc3db9f4eb2864afb016ba249e0b5d0eab7826

  • SHA256

    3368bf65527ab75cbc7d1ae545e4f9582ece0dfaef6cec4c88fd6725a3f8b069

  • SHA512

    00d7a71a2b6b165705e08278bf8fb69b265456e008b7b7ee4d8ff153d3ae62ae66392c4428dc8f363ac4408740121757834e90c63bc46ff50a4c4ee807b4c3a7

  • SSDEEP

    12288:uMr/y9082wcwY7W+ZToxIFrqe7BW23jD6xk1HeJzYlz0rDJavdmHmlbRSAFBwAHG:pyYwWpqe7Rn25zMFqSNiFhifUhLj

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Targets

    • Target

      3368bf65527ab75cbc7d1ae545e4f9582ece0dfaef6cec4c88fd6725a3f8b069

    • Size

      906KB

    • MD5

      1e145a64f67aee535bc77a6559a6d5a3

    • SHA1

      77bc3db9f4eb2864afb016ba249e0b5d0eab7826

    • SHA256

      3368bf65527ab75cbc7d1ae545e4f9582ece0dfaef6cec4c88fd6725a3f8b069

    • SHA512

      00d7a71a2b6b165705e08278bf8fb69b265456e008b7b7ee4d8ff153d3ae62ae66392c4428dc8f363ac4408740121757834e90c63bc46ff50a4c4ee807b4c3a7

    • SSDEEP

      12288:uMr/y9082wcwY7W+ZToxIFrqe7BW23jD6xk1HeJzYlz0rDJavdmHmlbRSAFBwAHG:pyYwWpqe7Rn25zMFqSNiFhifUhLj

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks