General

  • Target

    9a7cc7dff8422f56fcfb5c7d46d22e69f27c3a12e240ffe8f48a8a753a861f83

  • Size

    1.2MB

  • Sample

    241111-bgg45sslfr

  • MD5

    d9a19e32b269611fb367fe494e832247

  • SHA1

    be71bbe22ad44be8a4fed5c9d8e0cbd139e5be92

  • SHA256

    9a7cc7dff8422f56fcfb5c7d46d22e69f27c3a12e240ffe8f48a8a753a861f83

  • SHA512

    dc6329a0d6df749caeda6e8241ab5d24e50d8ffee3727f7482e8bd4c260d4e1b02f4a3282e97e775d7eddf7459f794367f48d2e60e6347ef506d470baba5b319

  • SSDEEP

    24576:29h9DPt4hMaYTFBwZRvrtKJk5vZssiYQbrAfUPR:2/9D14dYTP85rtZ5TT4Af

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      9a7cc7dff8422f56fcfb5c7d46d22e69f27c3a12e240ffe8f48a8a753a861f83

    • Size

      1.2MB

    • MD5

      d9a19e32b269611fb367fe494e832247

    • SHA1

      be71bbe22ad44be8a4fed5c9d8e0cbd139e5be92

    • SHA256

      9a7cc7dff8422f56fcfb5c7d46d22e69f27c3a12e240ffe8f48a8a753a861f83

    • SHA512

      dc6329a0d6df749caeda6e8241ab5d24e50d8ffee3727f7482e8bd4c260d4e1b02f4a3282e97e775d7eddf7459f794367f48d2e60e6347ef506d470baba5b319

    • SSDEEP

      24576:29h9DPt4hMaYTFBwZRvrtKJk5vZssiYQbrAfUPR:2/9D14dYTP85rtZ5TT4Af

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks