General

  • Target

    b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43

  • Size

    480KB

  • Sample

    241111-czex6s1ajr

  • MD5

    da1cc1c78eac047a2f7c5d90439ff257

  • SHA1

    d95e213ff9e2ead10a2dbff2b6724d66d45821c8

  • SHA256

    b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43

  • SHA512

    92b45f8967ed052d1231580bff233928be082a9c83aeb08df0ce792d03cd779994ea6c5523dbc919fe8dbdb1ecdc44548907a0c2ac1729067737ff44599e1b95

  • SSDEEP

    6144:K9y+bnr+Kp0yN90QEf6msjeWEvZZIVTQcWw7rtumjGYy+noibNwoU3JQ1xQzZmZp:TMrCy90M7MI2sxumbloQxWoIM

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Targets

    • Target

      b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43

    • Size

      480KB

    • MD5

      da1cc1c78eac047a2f7c5d90439ff257

    • SHA1

      d95e213ff9e2ead10a2dbff2b6724d66d45821c8

    • SHA256

      b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43

    • SHA512

      92b45f8967ed052d1231580bff233928be082a9c83aeb08df0ce792d03cd779994ea6c5523dbc919fe8dbdb1ecdc44548907a0c2ac1729067737ff44599e1b95

    • SSDEEP

      6144:K9y+bnr+Kp0yN90QEf6msjeWEvZZIVTQcWw7rtumjGYy+noibNwoU3JQ1xQzZmZp:TMrCy90M7MI2sxumbloQxWoIM

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks