General

  • Target

    9e56369e81b20485561f5e019522e0c8860051f8d547b50f4c1e04540eebcb5b

  • Size

    820KB

  • Sample

    241111-cvvststncn

  • MD5

    c39a8be22e40f9e7820e549ea8c60b7c

  • SHA1

    21297d30c9e7de5850e15e9161fa230ff3114106

  • SHA256

    9e56369e81b20485561f5e019522e0c8860051f8d547b50f4c1e04540eebcb5b

  • SHA512

    3716d465b3afb6e1473ac42b74f2b6e81646b871b6ea6d67b4650b4f937cc4888345dd3077eb0d87f9a972811b2a775a19e52e201eb63c449883e53fa38877cb

  • SSDEEP

    12288:XMrpy90mMQ4ry/3yE+67bs04qKAwRLkSJDQYmplgUsGxWUblmM5rbnffsdq/CMhT:Syv4c3yEd3KAo4MAgUsGxfmMRff/RT

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      9e56369e81b20485561f5e019522e0c8860051f8d547b50f4c1e04540eebcb5b

    • Size

      820KB

    • MD5

      c39a8be22e40f9e7820e549ea8c60b7c

    • SHA1

      21297d30c9e7de5850e15e9161fa230ff3114106

    • SHA256

      9e56369e81b20485561f5e019522e0c8860051f8d547b50f4c1e04540eebcb5b

    • SHA512

      3716d465b3afb6e1473ac42b74f2b6e81646b871b6ea6d67b4650b4f937cc4888345dd3077eb0d87f9a972811b2a775a19e52e201eb63c449883e53fa38877cb

    • SSDEEP

      12288:XMrpy90mMQ4ry/3yE+67bs04qKAwRLkSJDQYmplgUsGxWUblmM5rbnffsdq/CMhT:Syv4c3yEd3KAo4MAgUsGxfmMRff/RT

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks