General

  • Target

    1f8f2e95d6f85e33cc296e2b7176851bca9c1aa3b54ce642db91edb9844c7eb1

  • Size

    551KB

  • Sample

    241113-y4zc9sydnf

  • MD5

    555199ad434506ce0f8f21ebe69c8868

  • SHA1

    cc723560c3f9b6624ba44429d5c3817485f62a60

  • SHA256

    1f8f2e95d6f85e33cc296e2b7176851bca9c1aa3b54ce642db91edb9844c7eb1

  • SHA512

    f7a42ec464301b516dc4b26044e0ddfa3045610057739c80b4a2f208f9086a5d9aa7e9811eca7b9d4fbf62011d7f4b44f2f03b0af061cdd72c6d5c80d1185d60

  • SSDEEP

    12288:8Mrby90QWvWeLZBfLx73QS9qCAaiRdD1Ed/Vmpn4J8p56b+tH:XyLyBzW8A5iSn4JWU+Z

Malware Config

Extracted

Family

redline

Botnet

dezik

C2

193.56.146.220:4174

Attributes
  • auth_value

    d39f21dca8edc10800b036ab83f4d75e

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      1f8f2e95d6f85e33cc296e2b7176851bca9c1aa3b54ce642db91edb9844c7eb1

    • Size

      551KB

    • MD5

      555199ad434506ce0f8f21ebe69c8868

    • SHA1

      cc723560c3f9b6624ba44429d5c3817485f62a60

    • SHA256

      1f8f2e95d6f85e33cc296e2b7176851bca9c1aa3b54ce642db91edb9844c7eb1

    • SHA512

      f7a42ec464301b516dc4b26044e0ddfa3045610057739c80b4a2f208f9086a5d9aa7e9811eca7b9d4fbf62011d7f4b44f2f03b0af061cdd72c6d5c80d1185d60

    • SSDEEP

      12288:8Mrby90QWvWeLZBfLx73QS9qCAaiRdD1Ed/Vmpn4J8p56b+tH:XyLyBzW8A5iSn4JWU+Z

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks