General

  • Target

    e8ca67acf6a1418f253f19b57caa0a0995a7037f2db0b60eb3cb68e84eaf302b

  • Size

    821KB

  • Sample

    241111-a1svba1rdj

  • MD5

    7ad3313857bc10a0df6438b4c96a0775

  • SHA1

    e4308c3339e2ac67e0c820a55cf537220ebdfd86

  • SHA256

    e8ca67acf6a1418f253f19b57caa0a0995a7037f2db0b60eb3cb68e84eaf302b

  • SHA512

    82a94d18e7b9c18b6112714a0662005f8ee29e1a353a6551b61cf8c1865ea77dac5d0d9cb72edba5bcc905f793858c60897ea9dd201ad312c75fc0f5c8e1d86b

  • SSDEEP

    12288:fMrvy900XHy1WSQZG7MYhgZ1YqnIeM3M6LIMnfUB9rKeVIi:IyXHyY7o12VnmffU7rKa

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      e8ca67acf6a1418f253f19b57caa0a0995a7037f2db0b60eb3cb68e84eaf302b

    • Size

      821KB

    • MD5

      7ad3313857bc10a0df6438b4c96a0775

    • SHA1

      e4308c3339e2ac67e0c820a55cf537220ebdfd86

    • SHA256

      e8ca67acf6a1418f253f19b57caa0a0995a7037f2db0b60eb3cb68e84eaf302b

    • SHA512

      82a94d18e7b9c18b6112714a0662005f8ee29e1a353a6551b61cf8c1865ea77dac5d0d9cb72edba5bcc905f793858c60897ea9dd201ad312c75fc0f5c8e1d86b

    • SSDEEP

      12288:fMrvy900XHy1WSQZG7MYhgZ1YqnIeM3M6LIMnfUB9rKeVIi:IyXHyY7o12VnmffU7rKa

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks