General

  • Target

    4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e

  • Size

    560KB

  • Sample

    241111-c59dza1bpk

  • MD5

    dfe366e83e0734432ae0d34d4084bf2f

  • SHA1

    eeb9fa9d7c608b2ff32f9e05aee51d7086010f76

  • SHA256

    4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e

  • SHA512

    48d8cad9d449bf8da02a408b14324fc00c4a9d05198b57d34a4bf9b83b94c244ed86956f72174d6f010d352f42b22c324a0f604fbf02f8a45391ccf96292e3cd

  • SSDEEP

    12288:zMrNy90zV/haONjJzyKuWx8NDryqTd1u6yBx5rkE4Lh:uyEnNRyK7eJug1unBx5rkZt

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e

    • Size

      560KB

    • MD5

      dfe366e83e0734432ae0d34d4084bf2f

    • SHA1

      eeb9fa9d7c608b2ff32f9e05aee51d7086010f76

    • SHA256

      4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e

    • SHA512

      48d8cad9d449bf8da02a408b14324fc00c4a9d05198b57d34a4bf9b83b94c244ed86956f72174d6f010d352f42b22c324a0f604fbf02f8a45391ccf96292e3cd

    • SSDEEP

      12288:zMrNy90zV/haONjJzyKuWx8NDryqTd1u6yBx5rkE4Lh:uyEnNRyK7eJug1unBx5rkZt

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks