General

  • Target

    977ae4617e4c27dd32866aeff10eb1faf167a9cf4f2078c1d7f785d42f1d7fe0

  • Size

    539KB

  • Sample

    241111-ay3aza1ral

  • MD5

    830ec5be8ea0a8de8ddc1d9166565614

  • SHA1

    a8573469c41ae9d4ed19b2c78b7f75f34ad2b880

  • SHA256

    977ae4617e4c27dd32866aeff10eb1faf167a9cf4f2078c1d7f785d42f1d7fe0

  • SHA512

    70f9be90f8a2121928fe4cee2c51377b5cbae43fd6d05abd61f54cf92af15dac8d8ce0682b0891252be537ab5eb95c834979fe1a8f006a71dba2dff5320e0a45

  • SSDEEP

    12288:KMrJy90bMLn5stlUNfvacTmXGTpw3gabGHE3d9:TyY2n5sLaiwQR9

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Targets

    • Target

      977ae4617e4c27dd32866aeff10eb1faf167a9cf4f2078c1d7f785d42f1d7fe0

    • Size

      539KB

    • MD5

      830ec5be8ea0a8de8ddc1d9166565614

    • SHA1

      a8573469c41ae9d4ed19b2c78b7f75f34ad2b880

    • SHA256

      977ae4617e4c27dd32866aeff10eb1faf167a9cf4f2078c1d7f785d42f1d7fe0

    • SHA512

      70f9be90f8a2121928fe4cee2c51377b5cbae43fd6d05abd61f54cf92af15dac8d8ce0682b0891252be537ab5eb95c834979fe1a8f006a71dba2dff5320e0a45

    • SSDEEP

      12288:KMrJy90bMLn5stlUNfvacTmXGTpw3gabGHE3d9:TyY2n5sLaiwQR9

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks