General

  • Target

    461483e4205beee1aa63543da0f38a8a600d3004e0b473a21d81081032299ca8

  • Size

    479KB

  • Sample

    241111-a3cacaygld

  • MD5

    52567fd6246bb448734df2aff93df416

  • SHA1

    323ffb935af36d90897fa86e57375add88ea44ee

  • SHA256

    461483e4205beee1aa63543da0f38a8a600d3004e0b473a21d81081032299ca8

  • SHA512

    89b78fbcb41f1ff696440171ef33eec7c43b715bc7b485ac6cfe0dd5db8b6ad1db79d7d97f57683eae797dd5769fd580af0ec6aea53e976f135f0f8240fc1b74

  • SSDEEP

    12288:zMrdy90tLlxZ1kQTEflRkrOsF8cqINMszQvpIUOB8:WyULlxZZGk/ZqINsIUOB8

Malware Config

Extracted

Family

redline

Botnet

maxud

C2

217.196.96.101:4132

Attributes
  • auth_value

    f1403d964c52b6641ba1ef14803e6e74

Targets

    • Target

      461483e4205beee1aa63543da0f38a8a600d3004e0b473a21d81081032299ca8

    • Size

      479KB

    • MD5

      52567fd6246bb448734df2aff93df416

    • SHA1

      323ffb935af36d90897fa86e57375add88ea44ee

    • SHA256

      461483e4205beee1aa63543da0f38a8a600d3004e0b473a21d81081032299ca8

    • SHA512

      89b78fbcb41f1ff696440171ef33eec7c43b715bc7b485ac6cfe0dd5db8b6ad1db79d7d97f57683eae797dd5769fd580af0ec6aea53e976f135f0f8240fc1b74

    • SSDEEP

      12288:zMrdy90tLlxZ1kQTEflRkrOsF8cqINMszQvpIUOB8:WyULlxZZGk/ZqINsIUOB8

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks