General

  • Target

    cb4bbd1c47ab46202854e04c8f9afa46e88ac44eb89a6d615aaadd0f09eed03a

  • Size

    851KB

  • Sample

    241110-z732asymbj

  • MD5

    d1c7d47bd523f3784523c5a162ffb391

  • SHA1

    0df7c5dd2384f0dba8ab088390ae373ea54fa03f

  • SHA256

    cb4bbd1c47ab46202854e04c8f9afa46e88ac44eb89a6d615aaadd0f09eed03a

  • SHA512

    40c460438bbda25f92816aa4b556939ede321560b0dfcc58b7750f752ef8196f77d5d5c6e635e9faf8552f368bfac6edaef3ad03a66a633278a049d45581006f

  • SSDEEP

    24576:gyyu2LpfjRR4prP4DBmhZ1wQNVU2qZdI2O:nylL5QqDS7wQVUXw

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      cb4bbd1c47ab46202854e04c8f9afa46e88ac44eb89a6d615aaadd0f09eed03a

    • Size

      851KB

    • MD5

      d1c7d47bd523f3784523c5a162ffb391

    • SHA1

      0df7c5dd2384f0dba8ab088390ae373ea54fa03f

    • SHA256

      cb4bbd1c47ab46202854e04c8f9afa46e88ac44eb89a6d615aaadd0f09eed03a

    • SHA512

      40c460438bbda25f92816aa4b556939ede321560b0dfcc58b7750f752ef8196f77d5d5c6e635e9faf8552f368bfac6edaef3ad03a66a633278a049d45581006f

    • SSDEEP

      24576:gyyu2LpfjRR4prP4DBmhZ1wQNVU2qZdI2O:nylL5QqDS7wQVUXw

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks