General

  • Target

    a1032b4c782db2d2a6c601b2eddba92e1570a50a603c29d476001c5a37b3141c

  • Size

    538KB

  • Sample

    241111-b86ltazfqd

  • MD5

    bca9e8da35225376e123ac2bfb1ac879

  • SHA1

    eb8945f3d5476e065f1226a61bdb6fb4bf17696c

  • SHA256

    a1032b4c782db2d2a6c601b2eddba92e1570a50a603c29d476001c5a37b3141c

  • SHA512

    ee9c37e280a897b3dced340b4b3aa1079ac36f4541bd33621e2c2a7af9f6173de9821fe78e3948d5e25f50d1d86f24e673d01ce53b3e7372c3536cd9d3201941

  • SSDEEP

    12288:zMr7y90O6uotk6v6+LgCS5b0w1QnmuSrU0lMdO:4y6zOerStMs

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Targets

    • Target

      a1032b4c782db2d2a6c601b2eddba92e1570a50a603c29d476001c5a37b3141c

    • Size

      538KB

    • MD5

      bca9e8da35225376e123ac2bfb1ac879

    • SHA1

      eb8945f3d5476e065f1226a61bdb6fb4bf17696c

    • SHA256

      a1032b4c782db2d2a6c601b2eddba92e1570a50a603c29d476001c5a37b3141c

    • SHA512

      ee9c37e280a897b3dced340b4b3aa1079ac36f4541bd33621e2c2a7af9f6173de9821fe78e3948d5e25f50d1d86f24e673d01ce53b3e7372c3536cd9d3201941

    • SSDEEP

      12288:zMr7y90O6uotk6v6+LgCS5b0w1QnmuSrU0lMdO:4y6zOerStMs

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks