General

  • Target

    ab72d40bc69db5993ad1b541ceee05a52871617b9440a1d88cb26f7ee6ac4dc7

  • Size

    526KB

  • Sample

    241111-atjm3ayepg

  • MD5

    332b9cd7475ef20abb2bf3fa36766f17

  • SHA1

    54e80f2088d965942beaf4120109319591c5d8dd

  • SHA256

    ab72d40bc69db5993ad1b541ceee05a52871617b9440a1d88cb26f7ee6ac4dc7

  • SHA512

    50c9ed4d7625157da39caef8ba0aa4fe8800198a8d9944782afa66406cb8823ac409c92dc73e1ae03528d3efa934f5f0f1fc0cbae351fc0679228b9083a74ba0

  • SSDEEP

    12288:iMr3y909ccV6tu8u5jKQjDPI+UMoOZvsHrBLD:9yocM6tu8Ws+UMoOGRD

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      ab72d40bc69db5993ad1b541ceee05a52871617b9440a1d88cb26f7ee6ac4dc7

    • Size

      526KB

    • MD5

      332b9cd7475ef20abb2bf3fa36766f17

    • SHA1

      54e80f2088d965942beaf4120109319591c5d8dd

    • SHA256

      ab72d40bc69db5993ad1b541ceee05a52871617b9440a1d88cb26f7ee6ac4dc7

    • SHA512

      50c9ed4d7625157da39caef8ba0aa4fe8800198a8d9944782afa66406cb8823ac409c92dc73e1ae03528d3efa934f5f0f1fc0cbae351fc0679228b9083a74ba0

    • SSDEEP

      12288:iMr3y909ccV6tu8u5jKQjDPI+UMoOZvsHrBLD:9yocM6tu8Ws+UMoOGRD

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks