General

  • Target

    5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78

  • Size

    550KB

  • Sample

    241111-cln9pazfkn

  • MD5

    e20e1fa097ce26e117e46cfd25be2562

  • SHA1

    97b9b9c73a52461585976ce81fe8ef8f9f83b376

  • SHA256

    5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78

  • SHA512

    d34e4fcee1399f99dad225ddb9e33d6bf1c44f1c8151c80aba6791b0ff26079e871d8dd14e507e6e56e5cb42630df5f61c10f80fbab62f890cb267bc051bc995

  • SSDEEP

    12288:5Mr/y90RhTAO6b4aDTNmiWxwpCayBukIb+tpAUA3TIl/zP/:2yKTb6E+TUidCNMkIVUA3SP/

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Targets

    • Target

      5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78

    • Size

      550KB

    • MD5

      e20e1fa097ce26e117e46cfd25be2562

    • SHA1

      97b9b9c73a52461585976ce81fe8ef8f9f83b376

    • SHA256

      5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78

    • SHA512

      d34e4fcee1399f99dad225ddb9e33d6bf1c44f1c8151c80aba6791b0ff26079e871d8dd14e507e6e56e5cb42630df5f61c10f80fbab62f890cb267bc051bc995

    • SSDEEP

      12288:5Mr/y90RhTAO6b4aDTNmiWxwpCayBukIb+tpAUA3TIl/zP/:2yKTb6E+TUidCNMkIVUA3SP/

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks