General

  • Target

    f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595

  • Size

    536KB

  • Sample

    241111-b1tmaazarn

  • MD5

    40640a6bb945069bd0d55ee6c65aa88a

  • SHA1

    de029248d1eed6f25ab47d3755aef471938d8837

  • SHA256

    f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595

  • SHA512

    91f2869e0518064db57753b5013d3ce6f35740cb286a118028c40240c147f9cd4fd543b9e9507e6ff6288c7d84c8be2dabc6bd65235b97b63d7fefd9a5c737f9

  • SSDEEP

    12288:oMrxy90S0hVqHoSYgTq4JnEUE49+37ImQxvAlRVdn:ZypISYCDNE56ENVdn

Malware Config

Extracted

Family

redline

Botnet

rulit

C2

pedigj.eu:4162

Attributes
  • auth_value

    f4df9ef56871d4ac883b282abaf635e0

Targets

    • Target

      f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595

    • Size

      536KB

    • MD5

      40640a6bb945069bd0d55ee6c65aa88a

    • SHA1

      de029248d1eed6f25ab47d3755aef471938d8837

    • SHA256

      f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595

    • SHA512

      91f2869e0518064db57753b5013d3ce6f35740cb286a118028c40240c147f9cd4fd543b9e9507e6ff6288c7d84c8be2dabc6bd65235b97b63d7fefd9a5c737f9

    • SSDEEP

      12288:oMrxy90S0hVqHoSYgTq4JnEUE49+37ImQxvAlRVdn:ZypISYCDNE56ENVdn

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks