General

  • Target

    5f0f954edaa9bef5bdb925286c66a403ddfb9f9b64b6e71b178600de1d7c36df

  • Size

    478KB

  • Sample

    241111-a2pt2sydjr

  • MD5

    f3cb3a0da428790bd194b99d27f9f380

  • SHA1

    0aa6798b5760bd7e385ae381cf1db44f3f246178

  • SHA256

    5f0f954edaa9bef5bdb925286c66a403ddfb9f9b64b6e71b178600de1d7c36df

  • SHA512

    dea4034cae13a81507b25ede8f0ceba45b615eab14d6abfc8f71499b3dfc6ce9d8311b9cd3070a957fc990dd6fe2ce732e754e2ca0f4070df7e89628acd9a243

  • SSDEEP

    12288:pMr5y90QeczUQ55DZHbOsFmYHjcivYFOHgL:EyN555FIYHjdmOHo

Malware Config

Extracted

Family

redline

Botnet

mauga

C2

217.196.96.102:4132

Attributes
  • auth_value

    36f5411cf117f54076fbbb9ea0631fee

Targets

    • Target

      5f0f954edaa9bef5bdb925286c66a403ddfb9f9b64b6e71b178600de1d7c36df

    • Size

      478KB

    • MD5

      f3cb3a0da428790bd194b99d27f9f380

    • SHA1

      0aa6798b5760bd7e385ae381cf1db44f3f246178

    • SHA256

      5f0f954edaa9bef5bdb925286c66a403ddfb9f9b64b6e71b178600de1d7c36df

    • SHA512

      dea4034cae13a81507b25ede8f0ceba45b615eab14d6abfc8f71499b3dfc6ce9d8311b9cd3070a957fc990dd6fe2ce732e754e2ca0f4070df7e89628acd9a243

    • SSDEEP

      12288:pMr5y90QeczUQ55DZHbOsFmYHjcivYFOHgL:EyN555FIYHjdmOHo

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks