General

  • Target

    ac0739ccf686a61d2169bdfb33ab7fd46e23ac2d5cedab94c0253ef09489039c

  • Size

    516KB

  • Sample

    241111-a925cayhqc

  • MD5

    82a0cbad24eb20e27f515f3ffd9cd8c0

  • SHA1

    cd4a5a2551c19adf38e2ce362a8c7dae64cb173a

  • SHA256

    ac0739ccf686a61d2169bdfb33ab7fd46e23ac2d5cedab94c0253ef09489039c

  • SHA512

    d0912cf7cfb14d774dbffb43380d4425c776f128729c7b81157e3ddac877c19b438554db5a0bb2e2d2c7437cc98a73eab7bcbee8652c6d8936653c7d654238d0

  • SSDEEP

    12288:rMrNy904HAWaL8i04nioHGukmy3W/Ptvi9cS:qyT3NcOmymntvi9R

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Targets

    • Target

      ac0739ccf686a61d2169bdfb33ab7fd46e23ac2d5cedab94c0253ef09489039c

    • Size

      516KB

    • MD5

      82a0cbad24eb20e27f515f3ffd9cd8c0

    • SHA1

      cd4a5a2551c19adf38e2ce362a8c7dae64cb173a

    • SHA256

      ac0739ccf686a61d2169bdfb33ab7fd46e23ac2d5cedab94c0253ef09489039c

    • SHA512

      d0912cf7cfb14d774dbffb43380d4425c776f128729c7b81157e3ddac877c19b438554db5a0bb2e2d2c7437cc98a73eab7bcbee8652c6d8936653c7d654238d0

    • SSDEEP

      12288:rMrNy904HAWaL8i04nioHGukmy3W/Ptvi9cS:qyT3NcOmymntvi9R

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks