General

  • Target

    09a832576763ad06bbf2ad24072b042d29abe6b9793a9145dcc053cd61521f91

  • Size

    992KB

  • Sample

    241111-amncnsydng

  • MD5

    7cce66c279273f8d7dbd29d20f03817d

  • SHA1

    79300f28b97f9a663029d821d76dcc02a59d340d

  • SHA256

    09a832576763ad06bbf2ad24072b042d29abe6b9793a9145dcc053cd61521f91

  • SHA512

    73fc3cfa5b11d5bb1c91a7b4d53d0e6cdc2a51f2f486903c18b780596994409508cd0c93e3ce926aedde3deb0957b2c1c19889e21739f4fa95ff6157674bc4db

  • SSDEEP

    12288:GMrWy90ew8Xq95Pm038RP/ZR0ulXgZgoY2hsZTKskybJ/zTcRwR1TME/I5AvraoT:kyPfy60xgWhe5nbJrTcwMd5Avr5B

Malware Config

Extracted

Family

redline

Botnet

diora

C2

185.161.248.75:4132

Attributes
  • auth_value

    4c17e0c4a574a5b11a6e41e692dedcb3

Targets

    • Target

      09a832576763ad06bbf2ad24072b042d29abe6b9793a9145dcc053cd61521f91

    • Size

      992KB

    • MD5

      7cce66c279273f8d7dbd29d20f03817d

    • SHA1

      79300f28b97f9a663029d821d76dcc02a59d340d

    • SHA256

      09a832576763ad06bbf2ad24072b042d29abe6b9793a9145dcc053cd61521f91

    • SHA512

      73fc3cfa5b11d5bb1c91a7b4d53d0e6cdc2a51f2f486903c18b780596994409508cd0c93e3ce926aedde3deb0957b2c1c19889e21739f4fa95ff6157674bc4db

    • SSDEEP

      12288:GMrWy90ew8Xq95Pm038RP/ZR0ulXgZgoY2hsZTKskybJ/zTcRwR1TME/I5AvraoT:kyPfy60xgWhe5nbJrTcwMd5Avr5B

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks