General

  • Target

    7e9bf649fa75a3b8affa7f83ac236e10e12b8a05dcd8d9e9d0b178125b1d939d

  • Size

    906KB

  • Sample

    241111-ad4cja1mfm

  • MD5

    dde467ff2c1b4c61ca38f3fd57c608c9

  • SHA1

    d191856034f00191ebc5c55737bd55c01771906c

  • SHA256

    7e9bf649fa75a3b8affa7f83ac236e10e12b8a05dcd8d9e9d0b178125b1d939d

  • SHA512

    fee8c00dabb5568dcc163b4cb410b7d36c5bd3d78704d07373360d4704e0a28cd4c2a615e1aad4ef28b1ad7eef8d25b24c1583ec8a6fa72b12da86fe19b6d2bc

  • SSDEEP

    12288:1Mr3y90+LICE5XjlvwkOv3f0oulue9QWgeHChtMRUO7kYVYxHknHnkz/ReTYUcRI:Ky3cCErwkOv3so92EtMRKYVUzp8zN

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      7e9bf649fa75a3b8affa7f83ac236e10e12b8a05dcd8d9e9d0b178125b1d939d

    • Size

      906KB

    • MD5

      dde467ff2c1b4c61ca38f3fd57c608c9

    • SHA1

      d191856034f00191ebc5c55737bd55c01771906c

    • SHA256

      7e9bf649fa75a3b8affa7f83ac236e10e12b8a05dcd8d9e9d0b178125b1d939d

    • SHA512

      fee8c00dabb5568dcc163b4cb410b7d36c5bd3d78704d07373360d4704e0a28cd4c2a615e1aad4ef28b1ad7eef8d25b24c1583ec8a6fa72b12da86fe19b6d2bc

    • SSDEEP

      12288:1Mr3y90+LICE5XjlvwkOv3f0oulue9QWgeHChtMRUO7kYVYxHknHnkz/ReTYUcRI:Ky3cCErwkOv3so92EtMRKYVUzp8zN

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks