General

  • Target

    55f9e5284f17d47a56fa4725909e157cc0c679a1db9d4cd2f5cb5ddfad615da4

  • Size

    550KB

  • Sample

    241111-cw3j3azlgw

  • MD5

    1226ad47573b8620e3f7cb8fac95aa47

  • SHA1

    eab7d0d269cd1e322eefc4f95ad7550b767fff9c

  • SHA256

    55f9e5284f17d47a56fa4725909e157cc0c679a1db9d4cd2f5cb5ddfad615da4

  • SHA512

    c5884b2f30a239db9dd36af133cacece12ac402c4cca65384a09301c412cd3632c52a090213eb5259999d465e0474410666b382bd6fc6f073cb960526e81db73

  • SSDEEP

    6144:KNy+bnr+Cp0yN90QE0G8DSDA3UYgf+LOIavir4Fo7EZkzC7pGvsrs6ipt8pm2to:XMrqy90KbMAkpZzo7GlwkYB2m25plE4

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Targets

    • Target

      55f9e5284f17d47a56fa4725909e157cc0c679a1db9d4cd2f5cb5ddfad615da4

    • Size

      550KB

    • MD5

      1226ad47573b8620e3f7cb8fac95aa47

    • SHA1

      eab7d0d269cd1e322eefc4f95ad7550b767fff9c

    • SHA256

      55f9e5284f17d47a56fa4725909e157cc0c679a1db9d4cd2f5cb5ddfad615da4

    • SHA512

      c5884b2f30a239db9dd36af133cacece12ac402c4cca65384a09301c412cd3632c52a090213eb5259999d465e0474410666b382bd6fc6f073cb960526e81db73

    • SSDEEP

      6144:KNy+bnr+Cp0yN90QE0G8DSDA3UYgf+LOIavir4Fo7EZkzC7pGvsrs6ipt8pm2to:XMrqy90KbMAkpZzo7GlwkYB2m25plE4

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks