General

  • Target

    579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a

  • Size

    1.2MB

  • Sample

    241111-a4cx9sxrcw

  • MD5

    79a7607d46aa5872d6a1e20eb144f38f

  • SHA1

    b70e077738434da2297eb6dba34b63474268cdf7

  • SHA256

    579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a

  • SHA512

    d8cdc082b47b3ac2f80ce35f07fd7ae1c4aee072a3acbc8abdf54d4996b9352c813c4e9e259137d903db72221e547de5ed5f5350c5c1e65408bcceeaece40505

  • SSDEEP

    24576:5yQ0omQKEf3VPM/6vvd7zfj7Ymv0PpXgwh4HM069NhQpEaEW:sQZd3FM/eZXcmvxjs0ONhBX

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a

    • Size

      1.2MB

    • MD5

      79a7607d46aa5872d6a1e20eb144f38f

    • SHA1

      b70e077738434da2297eb6dba34b63474268cdf7

    • SHA256

      579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a

    • SHA512

      d8cdc082b47b3ac2f80ce35f07fd7ae1c4aee072a3acbc8abdf54d4996b9352c813c4e9e259137d903db72221e547de5ed5f5350c5c1e65408bcceeaece40505

    • SSDEEP

      24576:5yQ0omQKEf3VPM/6vvd7zfj7Ymv0PpXgwh4HM069NhQpEaEW:sQZd3FM/eZXcmvxjs0ONhBX

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks