General

  • Target

    64b3e99c88cecdff027b253b84c8b157e198efd38350519ff6bb0872f70e0f90

  • Size

    543KB

  • Sample

    241111-ber7bszaqa

  • MD5

    24a7f114cacc79b831d3d849819ea98d

  • SHA1

    3a2bd79c6f6426d8b5414f4f7e85c4acd35bfc5d

  • SHA256

    64b3e99c88cecdff027b253b84c8b157e198efd38350519ff6bb0872f70e0f90

  • SHA512

    458a9a387c1e995812fc1e220772aed2cb32280173c3a5073b449d6dda8d987c9431b55c15dc5eef6fae0be5a250cd72793537c93ed64ef249385d83977a1cfe

  • SSDEEP

    12288:8MrEy90qAOzM7ecDGslNBP5sdPAfllOAAVaAqQgJQksj:IyXfY7bGojWClOAGXUu

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      64b3e99c88cecdff027b253b84c8b157e198efd38350519ff6bb0872f70e0f90

    • Size

      543KB

    • MD5

      24a7f114cacc79b831d3d849819ea98d

    • SHA1

      3a2bd79c6f6426d8b5414f4f7e85c4acd35bfc5d

    • SHA256

      64b3e99c88cecdff027b253b84c8b157e198efd38350519ff6bb0872f70e0f90

    • SHA512

      458a9a387c1e995812fc1e220772aed2cb32280173c3a5073b449d6dda8d987c9431b55c15dc5eef6fae0be5a250cd72793537c93ed64ef249385d83977a1cfe

    • SSDEEP

      12288:8MrEy90qAOzM7ecDGslNBP5sdPAfllOAAVaAqQgJQksj:IyXfY7bGojWClOAGXUu

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks