General

  • Target

    b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61

  • Size

    548KB

  • Sample

    241111-cwb24szlew

  • MD5

    e28c453cba40b0848177b4fae6899952

  • SHA1

    e8ad9b42dda168bc2a982fe78134240f2fbffa7f

  • SHA256

    b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61

  • SHA512

    0bcf5f4867ced4a34dbda044c8893aca3e8cfddde992de20904a561e9490bb7663090e9f9d8c3acfd8a8d92b0c0f0cced468d41d2c3de514c188659a63cca25a

  • SSDEEP

    12288:4Mrhy90+YfTgSdbPBfAYqjAqMCaWdmXLfgew6UrG:5yBgPNmrFk79UrG

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61

    • Size

      548KB

    • MD5

      e28c453cba40b0848177b4fae6899952

    • SHA1

      e8ad9b42dda168bc2a982fe78134240f2fbffa7f

    • SHA256

      b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61

    • SHA512

      0bcf5f4867ced4a34dbda044c8893aca3e8cfddde992de20904a561e9490bb7663090e9f9d8c3acfd8a8d92b0c0f0cced468d41d2c3de514c188659a63cca25a

    • SSDEEP

      12288:4Mrhy90+YfTgSdbPBfAYqjAqMCaWdmXLfgew6UrG:5yBgPNmrFk79UrG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks