General

  • Target

    e2a7812bef3da03646f9d1b4335cad14f6fce4368dd248905e9b121015fb6726

  • Size

    478KB

  • Sample

    241110-hp7s4a1ncv

  • MD5

    cbb91fc2ef5d36b8fbd0b239cfed976a

  • SHA1

    dee146fb5c7a46e81562074b7bfa796a6c770fcc

  • SHA256

    e2a7812bef3da03646f9d1b4335cad14f6fce4368dd248905e9b121015fb6726

  • SHA512

    6543e1edae4d1d2d025f94b91ece53e8d3c08acc766f4a8ee17a875385123ec33515d8776418ad3d65dfbb1ffb88d38df1d5ab980b8dd10c22116f1cd093c31f

  • SSDEEP

    12288:uMrOy90KnaBu299Uz5c1u31LTqvAwNWLHwXXFCVE:kyRnGYXlTMCQX4VE

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      e2a7812bef3da03646f9d1b4335cad14f6fce4368dd248905e9b121015fb6726

    • Size

      478KB

    • MD5

      cbb91fc2ef5d36b8fbd0b239cfed976a

    • SHA1

      dee146fb5c7a46e81562074b7bfa796a6c770fcc

    • SHA256

      e2a7812bef3da03646f9d1b4335cad14f6fce4368dd248905e9b121015fb6726

    • SHA512

      6543e1edae4d1d2d025f94b91ece53e8d3c08acc766f4a8ee17a875385123ec33515d8776418ad3d65dfbb1ffb88d38df1d5ab980b8dd10c22116f1cd093c31f

    • SSDEEP

      12288:uMrOy90KnaBu299Uz5c1u31LTqvAwNWLHwXXFCVE:kyRnGYXlTMCQX4VE

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks