General

  • Target

    dc7aa7cc3a4ac710d5a2955c78ee831867e520044fcab6d353631745acbe49d7

  • Size

    685KB

  • Sample

    241111-c5jhjsznew

  • MD5

    ec1878ab95fa853e8492d3ce88ca8390

  • SHA1

    f8fd8309baae950868cb85134bfaf729cf3fcdc8

  • SHA256

    dc7aa7cc3a4ac710d5a2955c78ee831867e520044fcab6d353631745acbe49d7

  • SHA512

    9c3b926d7639029f0e11e38862b3db93d6b48bce6f7f5ea0d7ef0da149c38576c5e61f5764969a991f75a9ea2db2fb04fc8103c5fe645abd7c7c6c43124a4ab0

  • SSDEEP

    12288:YMrpy90TsHs0iKOk+adDz9l5U5Lx4DEIVB7nSjxNi8:hyNr5dlak3VB7nSjPi8

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Targets

    • Target

      dc7aa7cc3a4ac710d5a2955c78ee831867e520044fcab6d353631745acbe49d7

    • Size

      685KB

    • MD5

      ec1878ab95fa853e8492d3ce88ca8390

    • SHA1

      f8fd8309baae950868cb85134bfaf729cf3fcdc8

    • SHA256

      dc7aa7cc3a4ac710d5a2955c78ee831867e520044fcab6d353631745acbe49d7

    • SHA512

      9c3b926d7639029f0e11e38862b3db93d6b48bce6f7f5ea0d7ef0da149c38576c5e61f5764969a991f75a9ea2db2fb04fc8103c5fe645abd7c7c6c43124a4ab0

    • SSDEEP

      12288:YMrpy90TsHs0iKOk+adDz9l5U5Lx4DEIVB7nSjxNi8:hyNr5dlak3VB7nSjPi8

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks