General

  • Target

    03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19

  • Size

    479KB

  • Sample

    241111-cglyrstkbm

  • MD5

    d8aa17a35e7fffa914ee73bffd54fb44

  • SHA1

    9a23ae078acf8523ba9b60b60f6366f8d5495cbe

  • SHA256

    03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19

  • SHA512

    a3cea61ddacd442028dd924e1659df23c5ec5b5f6fc18352033c414dcefa38ada47f9b3c6a8b9559fa2fb445a7d7bd350e1c3139d3e38bda23e8bdf3418f0419

  • SSDEEP

    12288:ZMrzy90a/In/YP1qkxgWgl4FGPuHv+D1sVzK:eyXI/YNlTCTlD1qzK

Malware Config

Extracted

Family

redline

Botnet

murka

C2

217.196.96.101:4132

Attributes
  • auth_value

    878a0681ac6ad0e4eb10ef9db07abdd9

Targets

    • Target

      03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19

    • Size

      479KB

    • MD5

      d8aa17a35e7fffa914ee73bffd54fb44

    • SHA1

      9a23ae078acf8523ba9b60b60f6366f8d5495cbe

    • SHA256

      03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19

    • SHA512

      a3cea61ddacd442028dd924e1659df23c5ec5b5f6fc18352033c414dcefa38ada47f9b3c6a8b9559fa2fb445a7d7bd350e1c3139d3e38bda23e8bdf3418f0419

    • SSDEEP

      12288:ZMrzy90a/In/YP1qkxgWgl4FGPuHv+D1sVzK:eyXI/YNlTCTlD1qzK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks