General

  • Target

    ccccf8efa3c68306fdbb396deb4f8b722aeb3c16e0814ecf3d32d045c4dfa13c

  • Size

    689KB

  • Sample

    241111-cav8vsyqev

  • MD5

    972fccb408e5adc316919f4e000b8b48

  • SHA1

    2a8841058febe82f88bea6e95ce6407e7d638bf1

  • SHA256

    ccccf8efa3c68306fdbb396deb4f8b722aeb3c16e0814ecf3d32d045c4dfa13c

  • SHA512

    63d784a71d57a367a5bad899bc77aa9a5cf84a7df0572775266b3cafdca03c07baa65681a60b7e511e1c6fc10814234b49d4fbb3acdfd9051ec41e4bb48e5db0

  • SSDEEP

    12288:KMrxy90AHkifaqXl0nprZWrMdVL+JKizOcrNEfJs40S9P6KKNg:/yz9CqXl0nY4L+JlnNEfr0y6Kx

Malware Config

Extracted

Family

redline

Botnet

lint

C2

193.233.20.28:4125

Attributes
  • auth_value

    0e95262fb78243c67430f3148303e5b7

Targets

    • Target

      ccccf8efa3c68306fdbb396deb4f8b722aeb3c16e0814ecf3d32d045c4dfa13c

    • Size

      689KB

    • MD5

      972fccb408e5adc316919f4e000b8b48

    • SHA1

      2a8841058febe82f88bea6e95ce6407e7d638bf1

    • SHA256

      ccccf8efa3c68306fdbb396deb4f8b722aeb3c16e0814ecf3d32d045c4dfa13c

    • SHA512

      63d784a71d57a367a5bad899bc77aa9a5cf84a7df0572775266b3cafdca03c07baa65681a60b7e511e1c6fc10814234b49d4fbb3acdfd9051ec41e4bb48e5db0

    • SSDEEP

      12288:KMrxy90AHkifaqXl0nprZWrMdVL+JKizOcrNEfJs40S9P6KKNg:/yz9CqXl0nY4L+JlnNEfr0y6Kx

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks