General

  • Target

    714a2d280be933ee93590792b74662693fe2df293a14435a94e5846c236fbf86N

  • Size

    392KB

  • Sample

    241112-cvxbnasfne

  • MD5

    07e9b412649d1c26826f0c7b2490f650

  • SHA1

    a017e8d0e74f14a39d1e978c0a8694fce5ad3e46

  • SHA256

    714a2d280be933ee93590792b74662693fe2df293a14435a94e5846c236fbf86

  • SHA512

    f4c88f71bba3622c9538c50a675d682104ed88201c0ed83524327c0649bb58c36f2fb5d95a83032f09de1e2052638c0171cd13ebe407ad79c6efec8b7689cb0d

  • SSDEEP

    6144:KLy+bnr+rp0yN90QED5YZVlwUdYSJAUxUFML4Gy7a74i3H2VMyjPPydcT:RMrby90sZVlPYIA16Ldy7aEi3m0cT

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      714a2d280be933ee93590792b74662693fe2df293a14435a94e5846c236fbf86N

    • Size

      392KB

    • MD5

      07e9b412649d1c26826f0c7b2490f650

    • SHA1

      a017e8d0e74f14a39d1e978c0a8694fce5ad3e46

    • SHA256

      714a2d280be933ee93590792b74662693fe2df293a14435a94e5846c236fbf86

    • SHA512

      f4c88f71bba3622c9538c50a675d682104ed88201c0ed83524327c0649bb58c36f2fb5d95a83032f09de1e2052638c0171cd13ebe407ad79c6efec8b7689cb0d

    • SSDEEP

      6144:KLy+bnr+rp0yN90QED5YZVlwUdYSJAUxUFML4Gy7a74i3H2VMyjPPydcT:RMrby90sZVlPYIA16Ldy7aEi3m0cT

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks