General

  • Target

    cb9d830f94a8f196a133e58ac2fe0da20d98e27a92765b0c4ce57d123e465e3a.exe

  • Size

    405KB

  • Sample

    241111-qjm6hazckj

  • MD5

    4aa4a9d509210ff6a2d2fad64c7b1e3c

  • SHA1

    12a7252a24a6aa780d8bfaaf9979c7b73bcb5d8b

  • SHA256

    cb9d830f94a8f196a133e58ac2fe0da20d98e27a92765b0c4ce57d123e465e3a

  • SHA512

    d21f3d0ed9ba04de77d06c9f1f48935f42d97821ceac6f383b9b767fd54201b048761651689f6284343acb00f5a723145b46bea0ed81a9aff514ec4d1bc101a8

  • SSDEEP

    6144:KZy+bnr+rp0yN90QEH5MPKC0QrUKxg2jHux1CDe8jzQGt316caMkoqc9OCC4Q:bMrLy90t5MPKBRpSjzQ80eTjICPQ

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      cb9d830f94a8f196a133e58ac2fe0da20d98e27a92765b0c4ce57d123e465e3a.exe

    • Size

      405KB

    • MD5

      4aa4a9d509210ff6a2d2fad64c7b1e3c

    • SHA1

      12a7252a24a6aa780d8bfaaf9979c7b73bcb5d8b

    • SHA256

      cb9d830f94a8f196a133e58ac2fe0da20d98e27a92765b0c4ce57d123e465e3a

    • SHA512

      d21f3d0ed9ba04de77d06c9f1f48935f42d97821ceac6f383b9b767fd54201b048761651689f6284343acb00f5a723145b46bea0ed81a9aff514ec4d1bc101a8

    • SSDEEP

      6144:KZy+bnr+rp0yN90QEH5MPKC0QrUKxg2jHux1CDe8jzQGt316caMkoqc9OCC4Q:bMrLy90t5MPKBRpSjzQ80eTjICPQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks