General

  • Target

    d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5

  • Size

    479KB

  • Sample

    241111-fbq73stajl

  • MD5

    c78340d8c9abd6a241c84c8a99ddc3fa

  • SHA1

    aa92bc4f0be431c73cdaa7ee9a1a909c3e459d80

  • SHA256

    d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5

  • SHA512

    1297be28425635b422fcbc396b35da228e10dd1b83f6d9d710d923eb40de41013d72ff373d67f69b0fea76b640c36cbdc97308e7af211237f77f6f81009fb396

  • SSDEEP

    12288:8MrUy90Fs3TZ6RCNY0x95fr0gZwnfLfGkMFqOKH3ht:gyws3TkCN7x9ujD7oKXb

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5

    • Size

      479KB

    • MD5

      c78340d8c9abd6a241c84c8a99ddc3fa

    • SHA1

      aa92bc4f0be431c73cdaa7ee9a1a909c3e459d80

    • SHA256

      d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5

    • SHA512

      1297be28425635b422fcbc396b35da228e10dd1b83f6d9d710d923eb40de41013d72ff373d67f69b0fea76b640c36cbdc97308e7af211237f77f6f81009fb396

    • SSDEEP

      12288:8MrUy90Fs3TZ6RCNY0x95fr0gZwnfLfGkMFqOKH3ht:gyws3TkCN7x9ujD7oKXb

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks