General

  • Target

    9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824

  • Size

    478KB

  • Sample

    241111-ayx19ayfpb

  • MD5

    84c3ce4230728107705651538e1176ad

  • SHA1

    c09f8e9a0426b1eefeb349c10c0daf0f3ab18a35

  • SHA256

    9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824

  • SHA512

    01cb2c3467513f46b504d319de936e2ca461535971526403ea59fb10c36e82e43b00c18beba7df8734c3110c154c9f415273f28311b73e35f8fb4aabfa237d85

  • SSDEEP

    12288:zMryy90GcCRunrvK3oHKon68L7GwSKyUhEHxFo8b:Ryv9ADtnf7GLRHP9b

Malware Config

Extracted

Family

redline

Botnet

dippo

C2

217.196.96.102:4132

Attributes
  • auth_value

    79490ff628fd6af3b29170c3c163874b

Targets

    • Target

      9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824

    • Size

      478KB

    • MD5

      84c3ce4230728107705651538e1176ad

    • SHA1

      c09f8e9a0426b1eefeb349c10c0daf0f3ab18a35

    • SHA256

      9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824

    • SHA512

      01cb2c3467513f46b504d319de936e2ca461535971526403ea59fb10c36e82e43b00c18beba7df8734c3110c154c9f415273f28311b73e35f8fb4aabfa237d85

    • SSDEEP

      12288:zMryy90GcCRunrvK3oHKon68L7GwSKyUhEHxFo8b:Ryv9ADtnf7GLRHP9b

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks