General

  • Target

    bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c

  • Size

    479KB

  • Sample

    241111-azbveayfpg

  • MD5

    3affbc99cbfd6e036d894be7e7257bca

  • SHA1

    6262f739d038a64c57626fad817a02f509f28155

  • SHA256

    bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c

  • SHA512

    83d5d59b438030e1de71bf0e26e5a137fc6c1992ca6d8c62bb3a89a9cdf960dcd763b0e1d40505ad266704f43f9d4ff71e4b6abf7b2fa19860563d1da84b4c88

  • SSDEEP

    6144:Kjy+bnr+xp0yN90QEw2WhHm2zU8OD4Xl8S99zYj78CqMS9+mycd5CbMiLAii:xMrhy90XWhHp8418+K7/S9JyPbMis/

Malware Config

Extracted

Family

redline

Botnet

murka

C2

217.196.96.101:4132

Attributes
  • auth_value

    878a0681ac6ad0e4eb10ef9db07abdd9

Targets

    • Target

      bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c

    • Size

      479KB

    • MD5

      3affbc99cbfd6e036d894be7e7257bca

    • SHA1

      6262f739d038a64c57626fad817a02f509f28155

    • SHA256

      bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c

    • SHA512

      83d5d59b438030e1de71bf0e26e5a137fc6c1992ca6d8c62bb3a89a9cdf960dcd763b0e1d40505ad266704f43f9d4ff71e4b6abf7b2fa19860563d1da84b4c88

    • SSDEEP

      6144:Kjy+bnr+xp0yN90QEw2WhHm2zU8OD4Xl8S99zYj78CqMS9+mycd5CbMiLAii:xMrhy90XWhHp8418+K7/S9JyPbMis/

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks