General

  • Target

    6a7f43ab318e5b18f877accb28b2a26607c8dac82eed67e6169c966b3b208d0d

  • Size

    836KB

  • Sample

    241111-ad5wcsybre

  • MD5

    9ce6d84d73447699e902be2d4d64723b

  • SHA1

    04b8b048b539e71df5d072b61e5c0f9ec04c7e65

  • SHA256

    6a7f43ab318e5b18f877accb28b2a26607c8dac82eed67e6169c966b3b208d0d

  • SHA512

    e7c8a8972ef57450bd2bf1f453af1fdffb00ecde1129f46feea5cef67d44ecd6f7372d67ee4b3e0544537f8edc9b40758ae718c096866bd2fc52cc0594aa881e

  • SSDEEP

    12288:wMr9y90iI6vnoqbbzLEngkzvwEpxx5SDbuBXsR37Mn3OvOjzsAiIBSzCIR51AdKj:dyeEL70vpVqWsRk3XzdiRxREKj

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      6a7f43ab318e5b18f877accb28b2a26607c8dac82eed67e6169c966b3b208d0d

    • Size

      836KB

    • MD5

      9ce6d84d73447699e902be2d4d64723b

    • SHA1

      04b8b048b539e71df5d072b61e5c0f9ec04c7e65

    • SHA256

      6a7f43ab318e5b18f877accb28b2a26607c8dac82eed67e6169c966b3b208d0d

    • SHA512

      e7c8a8972ef57450bd2bf1f453af1fdffb00ecde1129f46feea5cef67d44ecd6f7372d67ee4b3e0544537f8edc9b40758ae718c096866bd2fc52cc0594aa881e

    • SSDEEP

      12288:wMr9y90iI6vnoqbbzLEngkzvwEpxx5SDbuBXsR37Mn3OvOjzsAiIBSzCIR51AdKj:dyeEL70vpVqWsRk3XzdiRxREKj

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks