General

  • Target

    90ac82a71e0e01a06686009dd86f9082d799035881723b4a1a76ae4dbe588f75

  • Size

    569KB

  • Sample

    241111-a17y8sygjh

  • MD5

    e892403f022c67c5e28ec477e7154628

  • SHA1

    0fcd64556dbef0c088ecc89d8b53924356760f78

  • SHA256

    90ac82a71e0e01a06686009dd86f9082d799035881723b4a1a76ae4dbe588f75

  • SHA512

    45fac969ed3ac0cdd59c723a9dd342e69864ea4d2e5cedbc40b4f8d0ff8922b1eef875a403b7f3e66753e98f3bdf6397977922225ca6e6a519774d1c68511a5f

  • SSDEEP

    12288:DMr3y901ahimz7AuxqVgVQWL1ZOQ3F3712yGgwI:4ywsVAuxYgq6ZOQ3F37Yg

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      90ac82a71e0e01a06686009dd86f9082d799035881723b4a1a76ae4dbe588f75

    • Size

      569KB

    • MD5

      e892403f022c67c5e28ec477e7154628

    • SHA1

      0fcd64556dbef0c088ecc89d8b53924356760f78

    • SHA256

      90ac82a71e0e01a06686009dd86f9082d799035881723b4a1a76ae4dbe588f75

    • SHA512

      45fac969ed3ac0cdd59c723a9dd342e69864ea4d2e5cedbc40b4f8d0ff8922b1eef875a403b7f3e66753e98f3bdf6397977922225ca6e6a519774d1c68511a5f

    • SSDEEP

      12288:DMr3y901ahimz7AuxqVgVQWL1ZOQ3F3712yGgwI:4ywsVAuxYgq6ZOQ3F37Yg

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks