General

  • Target

    a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b

  • Size

    544KB

  • Sample

    241111-cphlbazfqk

  • MD5

    81fe7a52ae7d7aa2653ded37b9011bfd

  • SHA1

    3d21925f8fc5dedc7c790ac3d14bb4dbf144d882

  • SHA256

    a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b

  • SHA512

    d8d26f33ee5efb1dcc550ecf0810fd382f7517d2c62e411fa394e5376165a2a41d57ad6bfd8a61547fa436f8faac45e676c4a8050b7fed1741b5da1ea11447e7

  • SSDEEP

    12288:pMrJy90gcHjdOY7GfQs3K/JYlflluArIJ65+by+QzgxKLBw:MyOjdQfQEK/6luAW652y+QzZLBw

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b

    • Size

      544KB

    • MD5

      81fe7a52ae7d7aa2653ded37b9011bfd

    • SHA1

      3d21925f8fc5dedc7c790ac3d14bb4dbf144d882

    • SHA256

      a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b

    • SHA512

      d8d26f33ee5efb1dcc550ecf0810fd382f7517d2c62e411fa394e5376165a2a41d57ad6bfd8a61547fa436f8faac45e676c4a8050b7fed1741b5da1ea11447e7

    • SSDEEP

      12288:pMrJy90gcHjdOY7GfQs3K/JYlflluArIJ65+by+QzgxKLBw:MyOjdQfQEK/6luAW652y+QzZLBw

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks