General

  • Target

    e93558b862ae428f469fc3e24408c79832ce3920059d5f0beb254b1561c5fe07

  • Size

    935KB

  • Sample

    241111-cy7a2azmcy

  • MD5

    742ec7b0f5819ad8a64dfa470a214338

  • SHA1

    a003b7ea84b97cb4981ee3e5b7b090821b0bfa4c

  • SHA256

    e93558b862ae428f469fc3e24408c79832ce3920059d5f0beb254b1561c5fe07

  • SHA512

    0dcb033495cb3c82df7d977106a5c937e95a66fa50d3bec4c513d1c8f039bf03d6d3424299a46882e2d20835b3fc8ca81feef18f54983793963761b5a432c316

  • SSDEEP

    24576:8yzjlJn3Yjr6nVYaXljPXSxKRYorM67hNmezg:rzJJn3YjreXj6KFXYQ

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Targets

    • Target

      e93558b862ae428f469fc3e24408c79832ce3920059d5f0beb254b1561c5fe07

    • Size

      935KB

    • MD5

      742ec7b0f5819ad8a64dfa470a214338

    • SHA1

      a003b7ea84b97cb4981ee3e5b7b090821b0bfa4c

    • SHA256

      e93558b862ae428f469fc3e24408c79832ce3920059d5f0beb254b1561c5fe07

    • SHA512

      0dcb033495cb3c82df7d977106a5c937e95a66fa50d3bec4c513d1c8f039bf03d6d3424299a46882e2d20835b3fc8ca81feef18f54983793963761b5a432c316

    • SSDEEP

      24576:8yzjlJn3Yjr6nVYaXljPXSxKRYorM67hNmezg:rzJJn3YjreXj6KFXYQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks