General

  • Target

    6a7e578069b28c7e9c6f8b5c0949eaa344308678395b0598837fef0847b7cf92.exe

  • Size

    695KB

  • Sample

    241113-krq98ssjar

  • MD5

    c5de52856d784d243b150d5556ae80ab

  • SHA1

    343c13d8af9c726919aa9b907a3a18f017b813f9

  • SHA256

    6a7e578069b28c7e9c6f8b5c0949eaa344308678395b0598837fef0847b7cf92

  • SHA512

    8b28624c4ef7fb089fdac2b793a4f16d622f2fa2b0afc64aa73cd52417ce509d2f0f619a1bff6a761b6fb509bcd14d0f404fd23ce849b4f023aaf14c88314920

  • SSDEEP

    12288:JMrAy90ovbqC+UXn758idC603+W6QwBBILaPI/IOa/aCeDVwbRxDK:pyM7UN8Qv0uWFWIug/vC6wbRtK

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      6a7e578069b28c7e9c6f8b5c0949eaa344308678395b0598837fef0847b7cf92.exe

    • Size

      695KB

    • MD5

      c5de52856d784d243b150d5556ae80ab

    • SHA1

      343c13d8af9c726919aa9b907a3a18f017b813f9

    • SHA256

      6a7e578069b28c7e9c6f8b5c0949eaa344308678395b0598837fef0847b7cf92

    • SHA512

      8b28624c4ef7fb089fdac2b793a4f16d622f2fa2b0afc64aa73cd52417ce509d2f0f619a1bff6a761b6fb509bcd14d0f404fd23ce849b4f023aaf14c88314920

    • SSDEEP

      12288:JMrAy90ovbqC+UXn758idC603+W6QwBBILaPI/IOa/aCeDVwbRxDK:pyM7UN8Qv0uWFWIug/vC6wbRtK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks