General

  • Target

    5d7587861650ff6607238c952851795305c53f1babb1ec198c626aa9661f9c61

  • Size

    819KB

  • Sample

    241111-arrwnayelc

  • MD5

    c9f6938f42bd97e9c26b12c5425cc964

  • SHA1

    cb0f0ebf94f1b153310abdff34f74eed7423b4da

  • SHA256

    5d7587861650ff6607238c952851795305c53f1babb1ec198c626aa9661f9c61

  • SHA512

    60ffa4a6cda1c6ff4d5f4cf75db7e2507f055d39a12b62c9d47813df5e6935d96a522850c408b3d527536bf00ab4a1ff439cf81988a3dc7565b7d87ed1f15d44

  • SSDEEP

    24576:XyT0XpKXs/8hn0WpOgjH6KG8U4Okz2tmUwI:iAXpChn1L6tStUw

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      5d7587861650ff6607238c952851795305c53f1babb1ec198c626aa9661f9c61

    • Size

      819KB

    • MD5

      c9f6938f42bd97e9c26b12c5425cc964

    • SHA1

      cb0f0ebf94f1b153310abdff34f74eed7423b4da

    • SHA256

      5d7587861650ff6607238c952851795305c53f1babb1ec198c626aa9661f9c61

    • SHA512

      60ffa4a6cda1c6ff4d5f4cf75db7e2507f055d39a12b62c9d47813df5e6935d96a522850c408b3d527536bf00ab4a1ff439cf81988a3dc7565b7d87ed1f15d44

    • SSDEEP

      24576:XyT0XpKXs/8hn0WpOgjH6KG8U4Okz2tmUwI:iAXpChn1L6tStUw

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks