General

  • Target

    6b5a4af5ac00cceb95f8051026546de3aec6d4f8d09c0c5338ef00cf8b47207bN

  • Size

    392KB

  • Sample

    241111-bpbx4azclg

  • MD5

    67895ba66b338d276af281134fb5b330

  • SHA1

    0aa4e3e8fd51f17e2aae8644863a8d858e0673cf

  • SHA256

    6b5a4af5ac00cceb95f8051026546de3aec6d4f8d09c0c5338ef00cf8b47207b

  • SHA512

    8dae7db9366194e45d2119559ab2fe406dc16b136e6d88945d96dcd6bc7bb9b7e42613b8b73cd3ead75e16db00685090c6cc89fa7b0e9bed31b5422c2cd22945

  • SSDEEP

    6144:KAy+bnr+zp0yN90QE5NUSLEeE/cn9OlJ6b2bJBW02DuaHfHh6iF/VCKX6/hv0nl2:sMrHy90HVp9yPbJBHaHfBvF/MKXNG3

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      6b5a4af5ac00cceb95f8051026546de3aec6d4f8d09c0c5338ef00cf8b47207bN

    • Size

      392KB

    • MD5

      67895ba66b338d276af281134fb5b330

    • SHA1

      0aa4e3e8fd51f17e2aae8644863a8d858e0673cf

    • SHA256

      6b5a4af5ac00cceb95f8051026546de3aec6d4f8d09c0c5338ef00cf8b47207b

    • SHA512

      8dae7db9366194e45d2119559ab2fe406dc16b136e6d88945d96dcd6bc7bb9b7e42613b8b73cd3ead75e16db00685090c6cc89fa7b0e9bed31b5422c2cd22945

    • SSDEEP

      6144:KAy+bnr+zp0yN90QE5NUSLEeE/cn9OlJ6b2bJBW02DuaHfHh6iF/VCKX6/hv0nl2:sMrHy90HVp9yPbJBHaHfBvF/MKXNG3

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks