General

  • Target

    d2ad9151664a554a3e1c58669ba5e6ceff58e1cbcf3a70897cf47e14ff818929

  • Size

    1.2MB

  • Sample

    241111-cxcd9stnfk

  • MD5

    a6da5084429141a4eafc63b800990689

  • SHA1

    c66eb697bae4cc9412d5b52cd387ebe2adc13bbd

  • SHA256

    d2ad9151664a554a3e1c58669ba5e6ceff58e1cbcf3a70897cf47e14ff818929

  • SHA512

    b6da8d2fed6bdccdfea5e13684dec2c4db94e9e77ab4858d2949d68c48db5026c303b4bd76aa4c555c74059fc3c0780062d19698fdfa38a13a2ef112127d1dff

  • SSDEEP

    24576:1ytVHg8W4+bscZ/DxJaoc1MaCE6O+aEzYe+M6RbNo4jx7SuNk:QrHfasM/DxJX4MaCLO+aCL+MZMlTN

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      d2ad9151664a554a3e1c58669ba5e6ceff58e1cbcf3a70897cf47e14ff818929

    • Size

      1.2MB

    • MD5

      a6da5084429141a4eafc63b800990689

    • SHA1

      c66eb697bae4cc9412d5b52cd387ebe2adc13bbd

    • SHA256

      d2ad9151664a554a3e1c58669ba5e6ceff58e1cbcf3a70897cf47e14ff818929

    • SHA512

      b6da8d2fed6bdccdfea5e13684dec2c4db94e9e77ab4858d2949d68c48db5026c303b4bd76aa4c555c74059fc3c0780062d19698fdfa38a13a2ef112127d1dff

    • SSDEEP

      24576:1ytVHg8W4+bscZ/DxJaoc1MaCE6O+aEzYe+M6RbNo4jx7SuNk:QrHfasM/DxJX4MaCLO+aCL+MZMlTN

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks