General

  • Target

    24bb1b02c979db4de11f2e6bc6b5c64519946a9764d202f690c2d434c30b541f

  • Size

    1.2MB

  • Sample

    241110-xt4dssshnl

  • MD5

    b4c46d6c32c6762157cc183849a8a56e

  • SHA1

    8b068fb424c71f337e711403cce3ed9b22a884bf

  • SHA256

    24bb1b02c979db4de11f2e6bc6b5c64519946a9764d202f690c2d434c30b541f

  • SHA512

    f3d70f9c1fb5ee3a7a08348f2af5033a0d85d362b5a3f79b74757b2a9f65666ca0b6bf0ebf253eda405fb7ccca341a2ba866cfd2c887349d6408aa0a6524f5f7

  • SSDEEP

    24576:lyQPvp0D62EUeq6NqvVksvMZeS3yAaWZFuYP5kmZtVsjKPW0jIGZj6GK:AxD62deqq4Vkp5cWZFB5BfiKPHjeG

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      24bb1b02c979db4de11f2e6bc6b5c64519946a9764d202f690c2d434c30b541f

    • Size

      1.2MB

    • MD5

      b4c46d6c32c6762157cc183849a8a56e

    • SHA1

      8b068fb424c71f337e711403cce3ed9b22a884bf

    • SHA256

      24bb1b02c979db4de11f2e6bc6b5c64519946a9764d202f690c2d434c30b541f

    • SHA512

      f3d70f9c1fb5ee3a7a08348f2af5033a0d85d362b5a3f79b74757b2a9f65666ca0b6bf0ebf253eda405fb7ccca341a2ba866cfd2c887349d6408aa0a6524f5f7

    • SSDEEP

      24576:lyQPvp0D62EUeq6NqvVksvMZeS3yAaWZFuYP5kmZtVsjKPW0jIGZj6GK:AxD62deqq4Vkp5cWZFB5BfiKPHjeG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks