General

  • Target

    aceb1b6ced445de4f5e1aa15ccb3978646510bbc372ec5eb5c33aa4f10e334a1

  • Size

    479KB

  • Sample

    241111-b4hzyszeqd

  • MD5

    ca01f554db34ee365303356360acc510

  • SHA1

    9d41e48da1d00c2330a9283212e735dbc02bed77

  • SHA256

    aceb1b6ced445de4f5e1aa15ccb3978646510bbc372ec5eb5c33aa4f10e334a1

  • SHA512

    6df230d6261f2e31ef5804ba2f6cb93f724f509ae12118b51450c9fc6090371d11231baf48ff5de0e1b8a036d71f778634ab1578bff811441ec17c00d56a9316

  • SSDEEP

    12288:gMrxy9007XJckj9qnaQkMQA2ObbAv4u5Vn4:By3jJcvnLkm26OXh4

Malware Config

Extracted

Family

redline

Botnet

mauga

C2

217.196.96.102:4132

Attributes
  • auth_value

    36f5411cf117f54076fbbb9ea0631fee

Targets

    • Target

      aceb1b6ced445de4f5e1aa15ccb3978646510bbc372ec5eb5c33aa4f10e334a1

    • Size

      479KB

    • MD5

      ca01f554db34ee365303356360acc510

    • SHA1

      9d41e48da1d00c2330a9283212e735dbc02bed77

    • SHA256

      aceb1b6ced445de4f5e1aa15ccb3978646510bbc372ec5eb5c33aa4f10e334a1

    • SHA512

      6df230d6261f2e31ef5804ba2f6cb93f724f509ae12118b51450c9fc6090371d11231baf48ff5de0e1b8a036d71f778634ab1578bff811441ec17c00d56a9316

    • SSDEEP

      12288:gMrxy9007XJckj9qnaQkMQA2ObbAv4u5Vn4:By3jJcvnLkm26OXh4

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks