General

  • Target

    f9488f043e25c8bd21e1bec0c58d42e3b36f1207e00cb5104e14eec7a0db7e23

  • Size

    544KB

  • Sample

    241111-b1v54szarp

  • MD5

    c01d2c69083281f035af1109142c3850

  • SHA1

    558db6c2f93cb0cc13c5c7dd7e43d29aadcf5dde

  • SHA256

    f9488f043e25c8bd21e1bec0c58d42e3b36f1207e00cb5104e14eec7a0db7e23

  • SHA512

    a39336942613484af06f34e4d02b43f7f13ff9253ee0942b94ad46eae308ab7b405a49c2c1f5bcfb1e1ed2359c4efd4cc799ecfb2b33ce660289c28ab7b4e5c7

  • SSDEEP

    12288:sMrAy90n6M1EsBVf96wkbQv/s0L6D6rKgcOQVSTLBdWZ8dicZ:cyvM1XBVF9koXBhce3jCqx

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      f9488f043e25c8bd21e1bec0c58d42e3b36f1207e00cb5104e14eec7a0db7e23

    • Size

      544KB

    • MD5

      c01d2c69083281f035af1109142c3850

    • SHA1

      558db6c2f93cb0cc13c5c7dd7e43d29aadcf5dde

    • SHA256

      f9488f043e25c8bd21e1bec0c58d42e3b36f1207e00cb5104e14eec7a0db7e23

    • SHA512

      a39336942613484af06f34e4d02b43f7f13ff9253ee0942b94ad46eae308ab7b405a49c2c1f5bcfb1e1ed2359c4efd4cc799ecfb2b33ce660289c28ab7b4e5c7

    • SSDEEP

      12288:sMrAy90n6M1EsBVf96wkbQv/s0L6D6rKgcOQVSTLBdWZ8dicZ:cyvM1XBVF9koXBhce3jCqx

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks