General

  • Target

    1cda71a3e37dbacc2187b00ee7cccd6901383ab1e08330cfd6791c2444959b2f

  • Size

    850KB

  • Sample

    241111-c7y11szpb1

  • MD5

    870d4f786a2d4ecb91bb189f85e3b47a

  • SHA1

    c4ad44a4d8de842ad08e673a7debeb2c26f88642

  • SHA256

    1cda71a3e37dbacc2187b00ee7cccd6901383ab1e08330cfd6791c2444959b2f

  • SHA512

    0083aa2d52f05bca67c347f0a0d0c255e1accb0a20c06fa0ba66dfac1dca73fd43161d00c723280a1c686b66e6377e60a67014704423b909723e3014dd3006c8

  • SSDEEP

    12288:eMrCy90AhLemA4Tf7lW+khHE2sMdEX5WsBVkdIMYpehXr52ZR7+SUiL1JT0RWUL:4yXrEHE2sMEX0kkdupeDU7aW+

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      1cda71a3e37dbacc2187b00ee7cccd6901383ab1e08330cfd6791c2444959b2f

    • Size

      850KB

    • MD5

      870d4f786a2d4ecb91bb189f85e3b47a

    • SHA1

      c4ad44a4d8de842ad08e673a7debeb2c26f88642

    • SHA256

      1cda71a3e37dbacc2187b00ee7cccd6901383ab1e08330cfd6791c2444959b2f

    • SHA512

      0083aa2d52f05bca67c347f0a0d0c255e1accb0a20c06fa0ba66dfac1dca73fd43161d00c723280a1c686b66e6377e60a67014704423b909723e3014dd3006c8

    • SSDEEP

      12288:eMrCy90AhLemA4Tf7lW+khHE2sMdEX5WsBVkdIMYpehXr52ZR7+SUiL1JT0RWUL:4yXrEHE2sMEX0kkdupeDU7aW+

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks