General

  • Target

    6200c83e0baee960046eec3f424c01730981f30cafbe9906b65ec73c71592802

  • Size

    479KB

  • Sample

    241110-tv5fpszlht

  • MD5

    852562ff654bd6d3334c91053678307f

  • SHA1

    f6e4b80ebe1e7e31ca0e9cd485572e53d2c7bbed

  • SHA256

    6200c83e0baee960046eec3f424c01730981f30cafbe9906b65ec73c71592802

  • SHA512

    804aa291cca7a89ffb2424027fa40b5a8e00da993f5b7e7c3c68f510e3bc05e45880468ab5fab7b702f4bf1f38c94fdce763ddec9921cdbdd439cd34df23968d

  • SSDEEP

    6144:KUy+bnr+mp0yN90QED2xxvP80wodqMKJgAh7hwyVp6nrMEE/5VtmsexsoHI:sMrqy90Ixx80h2tF5VgnrMvjwxE

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      6200c83e0baee960046eec3f424c01730981f30cafbe9906b65ec73c71592802

    • Size

      479KB

    • MD5

      852562ff654bd6d3334c91053678307f

    • SHA1

      f6e4b80ebe1e7e31ca0e9cd485572e53d2c7bbed

    • SHA256

      6200c83e0baee960046eec3f424c01730981f30cafbe9906b65ec73c71592802

    • SHA512

      804aa291cca7a89ffb2424027fa40b5a8e00da993f5b7e7c3c68f510e3bc05e45880468ab5fab7b702f4bf1f38c94fdce763ddec9921cdbdd439cd34df23968d

    • SSDEEP

      6144:KUy+bnr+mp0yN90QED2xxvP80wodqMKJgAh7hwyVp6nrMEE/5VtmsexsoHI:sMrqy90Ixx80h2tF5VgnrMvjwxE

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks