General

  • Target

    5de0ba05600ac2fddb4fb1e242447a5f382649c731366905ac14539bdbaf1870

  • Size

    485KB

  • Sample

    241111-ck7dwa1akh

  • MD5

    b4e930f8699a5b58a64ddc1fbb752069

  • SHA1

    3df4f556200df0025d019725762ee72af09570c7

  • SHA256

    5de0ba05600ac2fddb4fb1e242447a5f382649c731366905ac14539bdbaf1870

  • SHA512

    5dfd44dd58fb2c171eb44e001026af43f3621d5493324192bbdad179b38edab0cc57deb62515a2dd90af2f0e871c8122245e85d6ce79e271b12b42b4b1821fff

  • SSDEEP

    12288:IW9/l39Di23Qo+N1Z8m61u8m0QGSUDAp+JIuCP3:Ii/x9Di4dom1g0QG9y3

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Targets

    • Target

      18610f0c5f8676474a4b2d84610ef53f043f12076ee2f7d35f4634987bf2943c.exe

    • Size

      536KB

    • MD5

      8152de5fa13af0eb869f91fdf88f3486

    • SHA1

      59bd30de444e154b71d3d7bf1f14a9e37d7ab153

    • SHA256

      18610f0c5f8676474a4b2d84610ef53f043f12076ee2f7d35f4634987bf2943c

    • SHA512

      e9e03d84edfa7fe33eae1faa3c321d1d364e8d52ea1441222091238c31e36f25a51cb8477dbafd6578ab15905cf2b095d0b13d64e3d71957d11668a335218860

    • SSDEEP

      12288:HMr7y90Xm9sHJVOoxyCPEfYiIG7Z89J7tg5pyF40N8:YyNaVOVCygupyel

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks