General

  • Target

    03831d20fdf191cad660839546787fd3b26c259c75e5b84485d73f7302b267c2

  • Size

    1.2MB

  • Sample

    241111-cqhyga1bkb

  • MD5

    0dbf2d1e6ae8b513339b69132951ef97

  • SHA1

    e813d5e9dbb51d9c6fc57ba2d00773d6f2b56352

  • SHA256

    03831d20fdf191cad660839546787fd3b26c259c75e5b84485d73f7302b267c2

  • SHA512

    be9ef12e4877ff861f37360a3883a0a629a689ee25a9b429af6cf441e4761e51f05a752a7e28533f234eced8956d63cca91c8f20f5c8599cadd41ab27d5f7163

  • SSDEEP

    24576:Wy3oRq9QjwLW2Ijk0fWJx/A2tg0O4DwPI49BV7R9C1A6qpFxA4om:l3TQWs5WJPtJDkV7RoA6qpFx

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      03831d20fdf191cad660839546787fd3b26c259c75e5b84485d73f7302b267c2

    • Size

      1.2MB

    • MD5

      0dbf2d1e6ae8b513339b69132951ef97

    • SHA1

      e813d5e9dbb51d9c6fc57ba2d00773d6f2b56352

    • SHA256

      03831d20fdf191cad660839546787fd3b26c259c75e5b84485d73f7302b267c2

    • SHA512

      be9ef12e4877ff861f37360a3883a0a629a689ee25a9b429af6cf441e4761e51f05a752a7e28533f234eced8956d63cca91c8f20f5c8599cadd41ab27d5f7163

    • SSDEEP

      24576:Wy3oRq9QjwLW2Ijk0fWJx/A2tg0O4DwPI49BV7R9C1A6qpFxA4om:l3TQWs5WJPtJDkV7RoA6qpFx

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks