General

  • Target

    d63cd242f4b82c4cae0c7bf42fdbe2381f957c203c2ed523f93ef1ed29b72db7.exe

  • Size

    415KB

  • Sample

    241111-anxmqsxngy

  • MD5

    b0895c2bf2b5243dc12808adf5bc559b

  • SHA1

    5b29cb355df524f3fd50044602c40d84dc06b117

  • SHA256

    d63cd242f4b82c4cae0c7bf42fdbe2381f957c203c2ed523f93ef1ed29b72db7

  • SHA512

    550b1b0e588cb11d4d7aa412b266edcb7131bbb5532cd1414c3872197609b54c7d8a35440ce55c2210284d7d979b4759407a12ddf327a7ba0c42a435e2cd0bd8

  • SSDEEP

    6144:KVy+bnr+sp0yN90QEAhoJ7I7mw6LGBhca6G2nHX6WL4oocTygsS7RtI72V:nMrUy90GhoJc7mw6LGBhc1G8zFyw7V

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Targets

    • Target

      d63cd242f4b82c4cae0c7bf42fdbe2381f957c203c2ed523f93ef1ed29b72db7.exe

    • Size

      415KB

    • MD5

      b0895c2bf2b5243dc12808adf5bc559b

    • SHA1

      5b29cb355df524f3fd50044602c40d84dc06b117

    • SHA256

      d63cd242f4b82c4cae0c7bf42fdbe2381f957c203c2ed523f93ef1ed29b72db7

    • SHA512

      550b1b0e588cb11d4d7aa412b266edcb7131bbb5532cd1414c3872197609b54c7d8a35440ce55c2210284d7d979b4759407a12ddf327a7ba0c42a435e2cd0bd8

    • SSDEEP

      6144:KVy+bnr+sp0yN90QEAhoJ7I7mw6LGBhca6G2nHX6WL4oocTygsS7RtI72V:nMrUy90GhoJc7mw6LGBhc1G8zFyw7V

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks