General

  • Target

    6ea703e72b0bd0a575af9ce535c109d0ee9c71f3bc14aab90e46fc576ca3b101

  • Size

    660KB

  • Sample

    241110-dzr36syfka

  • MD5

    477c7c562ed4863ce5720d695bca8614

  • SHA1

    405547d6e3de0d8b23f305c3bc8bdbd0a3db3703

  • SHA256

    6ea703e72b0bd0a575af9ce535c109d0ee9c71f3bc14aab90e46fc576ca3b101

  • SHA512

    3d048afa4f633e4dc0aefef73c0aa66a907bcd561a1c8c4c1d5e956972f330573e53e5b7eef73550c865e4d99a42ef305fa16ceebf11abeb2b75dde539b00ba6

  • SSDEEP

    12288:nMroy909h0YjKgQqMbJWhK8zsTujQx535azBojhLfE+ZaSsa:Hy2h0YW3J/8NjcazBod/ISsa

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Targets

    • Target

      6ea703e72b0bd0a575af9ce535c109d0ee9c71f3bc14aab90e46fc576ca3b101

    • Size

      660KB

    • MD5

      477c7c562ed4863ce5720d695bca8614

    • SHA1

      405547d6e3de0d8b23f305c3bc8bdbd0a3db3703

    • SHA256

      6ea703e72b0bd0a575af9ce535c109d0ee9c71f3bc14aab90e46fc576ca3b101

    • SHA512

      3d048afa4f633e4dc0aefef73c0aa66a907bcd561a1c8c4c1d5e956972f330573e53e5b7eef73550c865e4d99a42ef305fa16ceebf11abeb2b75dde539b00ba6

    • SSDEEP

      12288:nMroy909h0YjKgQqMbJWhK8zsTujQx535azBojhLfE+ZaSsa:Hy2h0YW3J/8NjcazBod/ISsa

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks