General

  • Target

    1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d

  • Size

    1.1MB

  • Sample

    241111-cbx4vazgmd

  • MD5

    8bc18fd4d92f8303f91e9f240535eca3

  • SHA1

    dd5cec9ef0768e52c22efa48685df6ebc3e72940

  • SHA256

    1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d

  • SHA512

    97a28d13f944f857b2c3350daff4c12a736047b393ffb6e7f1107564d0f20995df8d30c657ce8a19cf72a650ee48111c7f81e2e13193acbda6ed0ef510ba4d42

  • SSDEEP

    24576:6yYuz9c7XroDXOlDtAPV9yI8vUJvznZgD:BLooDOPAdUItZ

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d

    • Size

      1.1MB

    • MD5

      8bc18fd4d92f8303f91e9f240535eca3

    • SHA1

      dd5cec9ef0768e52c22efa48685df6ebc3e72940

    • SHA256

      1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d

    • SHA512

      97a28d13f944f857b2c3350daff4c12a736047b393ffb6e7f1107564d0f20995df8d30c657ce8a19cf72a650ee48111c7f81e2e13193acbda6ed0ef510ba4d42

    • SSDEEP

      24576:6yYuz9c7XroDXOlDtAPV9yI8vUJvznZgD:BLooDOPAdUItZ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks