General

  • Target

    796da2d87359bb80fd6c6959739ead17618846231719d8c6f91c7915c522a245

  • Size

    688KB

  • Sample

    241111-btz6gszdkg

  • MD5

    ac6bd097404320142421f54d772797e9

  • SHA1

    848fe3f09c8042070db590c7061532a2ea80cf44

  • SHA256

    796da2d87359bb80fd6c6959739ead17618846231719d8c6f91c7915c522a245

  • SHA512

    d4b35c4f6645305ce8c3f36f5acf598c392a3e75eaf394afdc8c3ae788927df02c29c70b49ad4f3a05dc3da81202adf875c237cfb39c4788d616db0aae0d7ea0

  • SSDEEP

    12288:UMrFy90i9/GIIJGjs6BALlGpkHDzPujL9kgQ0KXUR04s:5yLZGdIZyH/PujRkgbKE04s

Malware Config

Extracted

Family

redline

Botnet

lint

C2

193.233.20.28:4125

Attributes
  • auth_value

    0e95262fb78243c67430f3148303e5b7

Targets

    • Target

      796da2d87359bb80fd6c6959739ead17618846231719d8c6f91c7915c522a245

    • Size

      688KB

    • MD5

      ac6bd097404320142421f54d772797e9

    • SHA1

      848fe3f09c8042070db590c7061532a2ea80cf44

    • SHA256

      796da2d87359bb80fd6c6959739ead17618846231719d8c6f91c7915c522a245

    • SHA512

      d4b35c4f6645305ce8c3f36f5acf598c392a3e75eaf394afdc8c3ae788927df02c29c70b49ad4f3a05dc3da81202adf875c237cfb39c4788d616db0aae0d7ea0

    • SSDEEP

      12288:UMrFy90i9/GIIJGjs6BALlGpkHDzPujL9kgQ0KXUR04s:5yLZGdIZyH/PujRkgbKE04s

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks