General

  • Target

    24af82eeb8d8a39bc40458016252866bd975c99645874a956de234cfd5ed2fd0

  • Size

    544KB

  • Sample

    241110-zzq2rsvlax

  • MD5

    701b8e044504c07166595cb47a21e170

  • SHA1

    36d76d36751b5e0c9451b414b75f5449f2c45bc9

  • SHA256

    24af82eeb8d8a39bc40458016252866bd975c99645874a956de234cfd5ed2fd0

  • SHA512

    437c51789550dabd8f7c99a3a63d31cab6b482fe27c7fb7f2051e1186799cb12ffda10c890e2d6abcf3c09a05a54c77309aa2b5f372885c78d6b2e6d4abff4c0

  • SSDEEP

    12288:hMr8y90c33M93LKxWTbjJp+g1/7dNiF8RSCflrOkPMGcx:5yl3893LOWTblpX4yRj5cx

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      24af82eeb8d8a39bc40458016252866bd975c99645874a956de234cfd5ed2fd0

    • Size

      544KB

    • MD5

      701b8e044504c07166595cb47a21e170

    • SHA1

      36d76d36751b5e0c9451b414b75f5449f2c45bc9

    • SHA256

      24af82eeb8d8a39bc40458016252866bd975c99645874a956de234cfd5ed2fd0

    • SHA512

      437c51789550dabd8f7c99a3a63d31cab6b482fe27c7fb7f2051e1186799cb12ffda10c890e2d6abcf3c09a05a54c77309aa2b5f372885c78d6b2e6d4abff4c0

    • SSDEEP

      12288:hMr8y90c33M93LKxWTbjJp+g1/7dNiF8RSCflrOkPMGcx:5yl3893LOWTblpX4yRj5cx

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks