General

  • Target

    ddea473f59607296e3ca8d1ddcc112da7fba449c9b7651ee9ffb2cd93d5ddd78

  • Size

    479KB

  • Sample

    241111-adts4axhlj

  • MD5

    4188e1f84bd8dc1c7ccb8715994acabc

  • SHA1

    830f821b472e9deaea05cd8ffa8eeda8eaea8d52

  • SHA256

    ddea473f59607296e3ca8d1ddcc112da7fba449c9b7651ee9ffb2cd93d5ddd78

  • SHA512

    af0b9ca25f342cc5794a2ac56fbb7ea9080165271df738cbd40eaedc95b801033bfe7ba04c63dfcaeb8af8c626360051123c69036feee4d149c918ba360764c9

  • SSDEEP

    12288:KMrhy90yJMSbYYWP473sOteuQFkjKmo6fR5pbuj:7y98LkVAmKmoeR5pKj

Malware Config

Extracted

Family

redline

Botnet

morty

C2

217.196.96.101:4132

Attributes
  • auth_value

    fe1a24c211cc8e5bf9ff11c737ce0e97

Targets

    • Target

      ddea473f59607296e3ca8d1ddcc112da7fba449c9b7651ee9ffb2cd93d5ddd78

    • Size

      479KB

    • MD5

      4188e1f84bd8dc1c7ccb8715994acabc

    • SHA1

      830f821b472e9deaea05cd8ffa8eeda8eaea8d52

    • SHA256

      ddea473f59607296e3ca8d1ddcc112da7fba449c9b7651ee9ffb2cd93d5ddd78

    • SHA512

      af0b9ca25f342cc5794a2ac56fbb7ea9080165271df738cbd40eaedc95b801033bfe7ba04c63dfcaeb8af8c626360051123c69036feee4d149c918ba360764c9

    • SSDEEP

      12288:KMrhy90yJMSbYYWP473sOteuQFkjKmo6fR5pbuj:7y98LkVAmKmoeR5pKj

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks