General

  • Target

    062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e

  • Size

    481KB

  • Sample

    241111-c2e1ystpgr

  • MD5

    c2cc8672da4238fe88decba6d3310bbe

  • SHA1

    9f4cb4df278b3f1e02cafcdc67f344a232650f2b

  • SHA256

    062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e

  • SHA512

    8bdd2e37ed2fb89d32e80dfd4e85b7807a9b246cf446f6f52b050f2053d9b9e7eaf30b173f123869f5355233412b1ff6bde03b634d511b3367b24f72cd424200

  • SSDEEP

    12288:VMrjy902SvGGTtpEMZ12HP2LDO/8y7MapLO0/p:SyGG6mfHaDO/8y7M2//p

Malware Config

Extracted

Family

redline

Botnet

mihan

C2

217.196.96.101:4132

Attributes
  • auth_value

    9a6a8fdae02ed7caa0a49a6ddc6d4520

Targets

    • Target

      062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e

    • Size

      481KB

    • MD5

      c2cc8672da4238fe88decba6d3310bbe

    • SHA1

      9f4cb4df278b3f1e02cafcdc67f344a232650f2b

    • SHA256

      062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e

    • SHA512

      8bdd2e37ed2fb89d32e80dfd4e85b7807a9b246cf446f6f52b050f2053d9b9e7eaf30b173f123869f5355233412b1ff6bde03b634d511b3367b24f72cd424200

    • SSDEEP

      12288:VMrjy902SvGGTtpEMZ12HP2LDO/8y7MapLO0/p:SyGG6mfHaDO/8y7M2//p

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks