General

  • Target

    d420315ddc9efa13163ad22a8abcfa00e3ae8286001e9b29ee5d522bbc4891d9

  • Size

    677KB

  • Sample

    241111-byltnaynds

  • MD5

    3a429d1c57d6d50a91dcf79f3200be26

  • SHA1

    e17bbb42970e0ae4999aaaf871fa42e94d455d51

  • SHA256

    d420315ddc9efa13163ad22a8abcfa00e3ae8286001e9b29ee5d522bbc4891d9

  • SHA512

    4e3ff37af60ad4a9c7c6a6abfff8070be262fcf288562307171a9374c9c376b34266dacab6acaa9674acb54520c2af16e367d30cd4af1147859216061eec4e29

  • SSDEEP

    12288:vMrMy907jCLiMzVcAttC/+59F1LmkjGXdAQMBJrLgqRhOSH7fu2ARIAAp7xf:vyYjCLi2V/L979jNbTHZhDHbQ87xf

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Targets

    • Target

      d420315ddc9efa13163ad22a8abcfa00e3ae8286001e9b29ee5d522bbc4891d9

    • Size

      677KB

    • MD5

      3a429d1c57d6d50a91dcf79f3200be26

    • SHA1

      e17bbb42970e0ae4999aaaf871fa42e94d455d51

    • SHA256

      d420315ddc9efa13163ad22a8abcfa00e3ae8286001e9b29ee5d522bbc4891d9

    • SHA512

      4e3ff37af60ad4a9c7c6a6abfff8070be262fcf288562307171a9374c9c376b34266dacab6acaa9674acb54520c2af16e367d30cd4af1147859216061eec4e29

    • SSDEEP

      12288:vMrMy907jCLiMzVcAttC/+59F1LmkjGXdAQMBJrLgqRhOSH7fu2ARIAAp7xf:vyYjCLi2V/L979jNbTHZhDHbQ87xf

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks