General

  • Target

    3fca7552fab60fc7b5d2bb80aeacfdd8f26b81b2956115fdf199243e7c9c9489N.exe

  • Size

    695KB

  • Sample

    241113-x1qraa1mem

  • MD5

    823304d5ad473e2f1a15ffecf5611d30

  • SHA1

    657a223be6d4c9f925c68276a1ad9d37bc97b7f2

  • SHA256

    3fca7552fab60fc7b5d2bb80aeacfdd8f26b81b2956115fdf199243e7c9c9489

  • SHA512

    4573f88282258fcc913e08991339f9d400987c0c74ee068c32010a4e8b06b763badc605a10f17d062009af5324ae7dd3ec9d6145f3306e6724fbfa70b6732630

  • SSDEEP

    12288:JMrAy90ovbqC+UXn758idC603+W6QwBBILaPI/IOa/aCeDVwbRxD:pyM7UN8Qv0uWFWIug/vC6wbRt

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      3fca7552fab60fc7b5d2bb80aeacfdd8f26b81b2956115fdf199243e7c9c9489N.exe

    • Size

      695KB

    • MD5

      823304d5ad473e2f1a15ffecf5611d30

    • SHA1

      657a223be6d4c9f925c68276a1ad9d37bc97b7f2

    • SHA256

      3fca7552fab60fc7b5d2bb80aeacfdd8f26b81b2956115fdf199243e7c9c9489

    • SHA512

      4573f88282258fcc913e08991339f9d400987c0c74ee068c32010a4e8b06b763badc605a10f17d062009af5324ae7dd3ec9d6145f3306e6724fbfa70b6732630

    • SSDEEP

      12288:JMrAy90ovbqC+UXn758idC603+W6QwBBILaPI/IOa/aCeDVwbRxD:pyM7UN8Qv0uWFWIug/vC6wbRt

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks