General

  • Target

    39702043f2c0d4141db3f079b03885ffc5cfd111be07002151033852605ee00e

  • Size

    537KB

  • Sample

    241110-zxmassvenq

  • MD5

    3f6460a7c3f7b649cc1f6f208780491e

  • SHA1

    755a6b37003223a40b5e6eff03c0d34567c340bc

  • SHA256

    39702043f2c0d4141db3f079b03885ffc5cfd111be07002151033852605ee00e

  • SHA512

    d50d02ddda1702221094f11c465d23faa5b4d6987e71b9481df40183d40d837438e4f4fdf236e4d3bbfb3f72539843a7d12d6e8eb7f97924d9eee9f659de98e5

  • SSDEEP

    12288:gMrpy90kLgarwufahQB73D7VqOLi9LDnnYyqwePTy:Zypga0uUu3D5i9LbnCLy

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      39702043f2c0d4141db3f079b03885ffc5cfd111be07002151033852605ee00e

    • Size

      537KB

    • MD5

      3f6460a7c3f7b649cc1f6f208780491e

    • SHA1

      755a6b37003223a40b5e6eff03c0d34567c340bc

    • SHA256

      39702043f2c0d4141db3f079b03885ffc5cfd111be07002151033852605ee00e

    • SHA512

      d50d02ddda1702221094f11c465d23faa5b4d6987e71b9481df40183d40d837438e4f4fdf236e4d3bbfb3f72539843a7d12d6e8eb7f97924d9eee9f659de98e5

    • SSDEEP

      12288:gMrpy90kLgarwufahQB73D7VqOLi9LDnnYyqwePTy:Zypga0uUu3D5i9LbnCLy

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks