General

  • Target

    a8bdf5cac8c5653ebea61a8f1eaff65e04a0ea601c095518dc1615ceb330b31e

  • Size

    1.1MB

  • Sample

    241110-ygh3rstdml

  • MD5

    6f37c269b5cae79a0586f30e630ffe7d

  • SHA1

    76d0fdf9d97323fa5ba0b78334967a4969a5c661

  • SHA256

    a8bdf5cac8c5653ebea61a8f1eaff65e04a0ea601c095518dc1615ceb330b31e

  • SHA512

    065f07ffdd29b950a4e487e08216e379fd74a409636d1d0f8bfb115b3c2aba753858123e982606e97d8b548653403ed157f0c3efc394a6ff8155936e3c89d9c1

  • SSDEEP

    24576:ty/VJ8WVFoJr9t+myJCgzUURmf9FfVVU627DJ9:I/LroJr2DkgOlg627D

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      a8bdf5cac8c5653ebea61a8f1eaff65e04a0ea601c095518dc1615ceb330b31e

    • Size

      1.1MB

    • MD5

      6f37c269b5cae79a0586f30e630ffe7d

    • SHA1

      76d0fdf9d97323fa5ba0b78334967a4969a5c661

    • SHA256

      a8bdf5cac8c5653ebea61a8f1eaff65e04a0ea601c095518dc1615ceb330b31e

    • SHA512

      065f07ffdd29b950a4e487e08216e379fd74a409636d1d0f8bfb115b3c2aba753858123e982606e97d8b548653403ed157f0c3efc394a6ff8155936e3c89d9c1

    • SSDEEP

      24576:ty/VJ8WVFoJr9t+myJCgzUURmf9FfVVU627DJ9:I/LroJr2DkgOlg627D

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks