General

  • Target

    89baeb3e52c275a943b8eac1594881a3cc0bedfedce5d640bc223737a14d3cba

  • Size

    555KB

  • Sample

    241111-bsd7maymdy

  • MD5

    6a623d53d0ed23fda949820f1dfc0b24

  • SHA1

    c00aa74fee435231bb444ded346b0270d1aa2066

  • SHA256

    89baeb3e52c275a943b8eac1594881a3cc0bedfedce5d640bc223737a14d3cba

  • SHA512

    9f4745704f0a8ab504d4717115afb086d4ced6f0e86d9b9ca775c80637804b9241b6f27950bc06059bb8f376f9de756170bc4340b5ba8f550d5ebbda89654437

  • SSDEEP

    12288:aMrWy90CnhzQQVV+kM74dflKF8X7EcIEDUW8yYCuNuMQ:EyrVVvflEy7QL2MQ

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Targets

    • Target

      89baeb3e52c275a943b8eac1594881a3cc0bedfedce5d640bc223737a14d3cba

    • Size

      555KB

    • MD5

      6a623d53d0ed23fda949820f1dfc0b24

    • SHA1

      c00aa74fee435231bb444ded346b0270d1aa2066

    • SHA256

      89baeb3e52c275a943b8eac1594881a3cc0bedfedce5d640bc223737a14d3cba

    • SHA512

      9f4745704f0a8ab504d4717115afb086d4ced6f0e86d9b9ca775c80637804b9241b6f27950bc06059bb8f376f9de756170bc4340b5ba8f550d5ebbda89654437

    • SSDEEP

      12288:aMrWy90CnhzQQVV+kM74dflKF8X7EcIEDUW8yYCuNuMQ:EyrVVvflEy7QL2MQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks