General

  • Target

    a5d66c3053fe2487a4be801276c5be7c798a0cef2d281f7f5f15730d8dff5d37N

  • Size

    866KB

  • Sample

    241111-ax8fla1qgr

  • MD5

    85948caf86dad01d8ddc4f73a2386960

  • SHA1

    31bc832f9d2fd72c51743a2ab530a9cd1b621dd5

  • SHA256

    a5d66c3053fe2487a4be801276c5be7c798a0cef2d281f7f5f15730d8dff5d37

  • SHA512

    042f5472c68c3598056b16df3f5a1a4472dfe2795b048c757fcc6ae1b799c50998458fe1821a572fab2ae1fbe4fa4f39f70738e6bbaf66018b21fea4ae5c3ba8

  • SSDEEP

    12288:LMrfy905D4TZ44weGtI0sH4cY3z83sIspNkQ1wenJlQ7d23s+4u+e1bcnz/qAk3M:YyEDN4dGRD8okQ1wSed23sTuezyAZ

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      a5d66c3053fe2487a4be801276c5be7c798a0cef2d281f7f5f15730d8dff5d37N

    • Size

      866KB

    • MD5

      85948caf86dad01d8ddc4f73a2386960

    • SHA1

      31bc832f9d2fd72c51743a2ab530a9cd1b621dd5

    • SHA256

      a5d66c3053fe2487a4be801276c5be7c798a0cef2d281f7f5f15730d8dff5d37

    • SHA512

      042f5472c68c3598056b16df3f5a1a4472dfe2795b048c757fcc6ae1b799c50998458fe1821a572fab2ae1fbe4fa4f39f70738e6bbaf66018b21fea4ae5c3ba8

    • SSDEEP

      12288:LMrfy905D4TZ44weGtI0sH4cY3z83sIspNkQ1wenJlQ7d23s+4u+e1bcnz/qAk3M:YyEDN4dGRD8okQ1wSed23sTuezyAZ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks