General

  • Target

    575936441d7d9432997c1183df25e066db716c7d2298c502bde472d74d778852

  • Size

    1.1MB

  • Sample

    241111-bsnq3asner

  • MD5

    0fd22b67b24da055e2a005fd82503957

  • SHA1

    893d5d168451cf65a5ed07217be13ea5a5e0f973

  • SHA256

    575936441d7d9432997c1183df25e066db716c7d2298c502bde472d74d778852

  • SHA512

    fa34d7490d8ddf85a35993da4e7d7806d8084c5d40fecc5eb8ab50a9e2eb5f3408735e20c38fc1b946982b3c881a88293e97fd1c0b911e568e6979fcab5d2562

  • SSDEEP

    24576:cyD0bdvXpjR5wdQHPpnJeCMYBXKPpELg6iMDxSs6AP/k9f:LW53JJRKu06iMDxSAX

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      575936441d7d9432997c1183df25e066db716c7d2298c502bde472d74d778852

    • Size

      1.1MB

    • MD5

      0fd22b67b24da055e2a005fd82503957

    • SHA1

      893d5d168451cf65a5ed07217be13ea5a5e0f973

    • SHA256

      575936441d7d9432997c1183df25e066db716c7d2298c502bde472d74d778852

    • SHA512

      fa34d7490d8ddf85a35993da4e7d7806d8084c5d40fecc5eb8ab50a9e2eb5f3408735e20c38fc1b946982b3c881a88293e97fd1c0b911e568e6979fcab5d2562

    • SSDEEP

      24576:cyD0bdvXpjR5wdQHPpnJeCMYBXKPpELg6iMDxSs6AP/k9f:LW53JJRKu06iMDxSAX

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks