General

  • Target

    02d984087c4c332dd0a35144088fca0e7b933da5764ce9d8cfdfc45ef0d8e507

  • Size

    479KB

  • Sample

    241111-a6zj2syekj

  • MD5

    288009250d13c791b638c62a83078b19

  • SHA1

    7442e90e5831fd5d0ff77527f5ae1c9294ff69bc

  • SHA256

    02d984087c4c332dd0a35144088fca0e7b933da5764ce9d8cfdfc45ef0d8e507

  • SHA512

    c626eea7b13ddaf78df703b263c6927af34b3733c88e72ee006d38e2b294b09f592c0a5d2a8dcabfbf41ddbc8c88234cb6e7de091845c178a853a49aaf141688

  • SSDEEP

    12288:hMrry90/REfRM6GdvOi0VwGluafnfDAmE:iyYEZi0VwGfMmE

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Targets

    • Target

      02d984087c4c332dd0a35144088fca0e7b933da5764ce9d8cfdfc45ef0d8e507

    • Size

      479KB

    • MD5

      288009250d13c791b638c62a83078b19

    • SHA1

      7442e90e5831fd5d0ff77527f5ae1c9294ff69bc

    • SHA256

      02d984087c4c332dd0a35144088fca0e7b933da5764ce9d8cfdfc45ef0d8e507

    • SHA512

      c626eea7b13ddaf78df703b263c6927af34b3733c88e72ee006d38e2b294b09f592c0a5d2a8dcabfbf41ddbc8c88234cb6e7de091845c178a853a49aaf141688

    • SSDEEP

      12288:hMrry90/REfRM6GdvOi0VwGluafnfDAmE:iyYEZi0VwGfMmE

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks