General

  • Target

    3138caa0bb237780d7eada68a5196e78803ea1eff662128aa41f1ff32aa8dec2

  • Size

    535KB

  • Sample

    241111-axxn4axqcy

  • MD5

    fc9a6a09f7d2e091c99abbfc6fe5fa4a

  • SHA1

    cf05dc6e3cd1a02c5006b4f9bc53f0429145d367

  • SHA256

    3138caa0bb237780d7eada68a5196e78803ea1eff662128aa41f1ff32aa8dec2

  • SHA512

    41f742bed428aa08bf7bb7f74cd7dc3b6609cf70c10d25f89079a9abb9fc06ec8168c6470f7d99861914c889be28be0c46693147e7bdb589b0d92c1fd8fe6c1d

  • SSDEEP

    12288:0MrHy90st+7u8PUNzlQlnuhXKOgNkz9eO/:Dylt+7ZPUNz3P/

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      3138caa0bb237780d7eada68a5196e78803ea1eff662128aa41f1ff32aa8dec2

    • Size

      535KB

    • MD5

      fc9a6a09f7d2e091c99abbfc6fe5fa4a

    • SHA1

      cf05dc6e3cd1a02c5006b4f9bc53f0429145d367

    • SHA256

      3138caa0bb237780d7eada68a5196e78803ea1eff662128aa41f1ff32aa8dec2

    • SHA512

      41f742bed428aa08bf7bb7f74cd7dc3b6609cf70c10d25f89079a9abb9fc06ec8168c6470f7d99861914c889be28be0c46693147e7bdb589b0d92c1fd8fe6c1d

    • SSDEEP

      12288:0MrHy90st+7u8PUNzlQlnuhXKOgNkz9eO/:Dylt+7ZPUNz3P/

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks