General

  • Target

    67455653d4fb4908630d1dc81aa4f655055f06c67a3f270d0d7549eaee54df78

  • Size

    557KB

  • Sample

    241111-axv59sycmj

  • MD5

    33fbefbe2822e56b4d2a7d7d8c3727ea

  • SHA1

    aff9636480b7a8a2e773ba2543b1bc4c3d6ded81

  • SHA256

    67455653d4fb4908630d1dc81aa4f655055f06c67a3f270d0d7549eaee54df78

  • SHA512

    5d824ce62a000447d38a672af7312eaa1e286c3d4b57e8e2046f7705c21f48d689170eed5a4986ed4fc2cfaf0388d15a9bfe4326781887802d509fa161d75c6b

  • SSDEEP

    12288:LMriy90f+8rN7IddLMUxnHpl6pQK3g94CPZYZevAlW:5y8lREzLMUTQM9fKQvEW

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Targets

    • Target

      67455653d4fb4908630d1dc81aa4f655055f06c67a3f270d0d7549eaee54df78

    • Size

      557KB

    • MD5

      33fbefbe2822e56b4d2a7d7d8c3727ea

    • SHA1

      aff9636480b7a8a2e773ba2543b1bc4c3d6ded81

    • SHA256

      67455653d4fb4908630d1dc81aa4f655055f06c67a3f270d0d7549eaee54df78

    • SHA512

      5d824ce62a000447d38a672af7312eaa1e286c3d4b57e8e2046f7705c21f48d689170eed5a4986ed4fc2cfaf0388d15a9bfe4326781887802d509fa161d75c6b

    • SSDEEP

      12288:LMriy90f+8rN7IddLMUxnHpl6pQK3g94CPZYZevAlW:5y8lREzLMUTQM9fKQvEW

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks