General

  • Target

    e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272

  • Size

    480KB

  • Sample

    241111-bd9d8aykcy

  • MD5

    8c7aa3c8b63b0a68c9717c388ed7a165

  • SHA1

    81ff10cfb60d2ea2625f08924103fbd226baf325

  • SHA256

    e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272

  • SHA512

    99f7a2f15799fd495ee44bb94bae33a72459ea73bdb91c9835247c717b60f19e4be3a9cdc0115a4f5af5e2f6ac64fa4e9b86f9ccfc5746e691e2226cea14df28

  • SSDEEP

    12288:wMrVy90iqwoXPOQlWXXga3NUlbaCgv3Q8q:1y7o/Jba3NU9/gv7q

Malware Config

Extracted

Family

redline

Botnet

douma

C2

217.196.96.101:4132

Attributes
  • auth_value

    e7c0659b5f9d26f2f97df8d25fefbb44

Targets

    • Target

      e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272

    • Size

      480KB

    • MD5

      8c7aa3c8b63b0a68c9717c388ed7a165

    • SHA1

      81ff10cfb60d2ea2625f08924103fbd226baf325

    • SHA256

      e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272

    • SHA512

      99f7a2f15799fd495ee44bb94bae33a72459ea73bdb91c9835247c717b60f19e4be3a9cdc0115a4f5af5e2f6ac64fa4e9b86f9ccfc5746e691e2226cea14df28

    • SSDEEP

      12288:wMrVy90iqwoXPOQlWXXga3NUlbaCgv3Q8q:1y7o/Jba3NU9/gv7q

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks