General

  • Target

    3174da51e95b35d2f024b352cfde35836bed254eb412a6c41f555e04e094583b

  • Size

    693KB

  • Sample

    241110-dgp6vsyakq

  • MD5

    eaa46b60fb92cfb695d520696c55cba2

  • SHA1

    6dc4c98cc0b1079de95b4fcc799a0c67199f4312

  • SHA256

    3174da51e95b35d2f024b352cfde35836bed254eb412a6c41f555e04e094583b

  • SHA512

    e9c703b3880c4517a4b8a787d001392050dffb9d0bfe5c05d765a7633dd53e3e1b081cf63f33852f02bb3c4fd7c8cdb751a991671271e766251576fd24c787b6

  • SSDEEP

    12288:HMr5y90th/KHYdInaTYk5SAVzX3wqFjM1TT35dHN4sklYQxxor8nEXn:uyQK4dIqYk5S0zXAqFQbHCflnjogEX

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Targets

    • Target

      3174da51e95b35d2f024b352cfde35836bed254eb412a6c41f555e04e094583b

    • Size

      693KB

    • MD5

      eaa46b60fb92cfb695d520696c55cba2

    • SHA1

      6dc4c98cc0b1079de95b4fcc799a0c67199f4312

    • SHA256

      3174da51e95b35d2f024b352cfde35836bed254eb412a6c41f555e04e094583b

    • SHA512

      e9c703b3880c4517a4b8a787d001392050dffb9d0bfe5c05d765a7633dd53e3e1b081cf63f33852f02bb3c4fd7c8cdb751a991671271e766251576fd24c787b6

    • SSDEEP

      12288:HMr5y90th/KHYdInaTYk5SAVzX3wqFjM1TT35dHN4sklYQxxor8nEXn:uyQK4dIqYk5S0zXAqFQbHCflnjogEX

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks