General

  • Target

    91d444a6c9e24eef17112b0a78da958b74e52f7e6094dcbee5ceba74218f60e2N.exe

  • Size

    852KB

  • Sample

    241114-crmytasmdv

  • MD5

    59363d2c9a54475453b376d97c9ee620

  • SHA1

    187b34e7b2e8e12b439bfc48bdb167002e9fe053

  • SHA256

    91d444a6c9e24eef17112b0a78da958b74e52f7e6094dcbee5ceba74218f60e2

  • SHA512

    a9fd7b647505cd1d5b1071ec8a0e19faea16d84918281d28afd6248aae3b030740ba1a91c093eeb49eb84bb6349bd4e00b11f26338b0de96eeb1736c40963e70

  • SSDEEP

    12288:TMroy90EFkZeGeGA30bkXAJ2b8AbGNtTRswj+vlSAjfQy3vDgwSW4U8oc28LSQiy:TyHWJKkkXLQQQtswj+vl73vD3ioX8Cy

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      91d444a6c9e24eef17112b0a78da958b74e52f7e6094dcbee5ceba74218f60e2N.exe

    • Size

      852KB

    • MD5

      59363d2c9a54475453b376d97c9ee620

    • SHA1

      187b34e7b2e8e12b439bfc48bdb167002e9fe053

    • SHA256

      91d444a6c9e24eef17112b0a78da958b74e52f7e6094dcbee5ceba74218f60e2

    • SHA512

      a9fd7b647505cd1d5b1071ec8a0e19faea16d84918281d28afd6248aae3b030740ba1a91c093eeb49eb84bb6349bd4e00b11f26338b0de96eeb1736c40963e70

    • SSDEEP

      12288:TMroy90EFkZeGeGA30bkXAJ2b8AbGNtTRswj+vlSAjfQy3vDgwSW4U8oc28LSQiy:TyHWJKkkXLQQQtswj+vl73vD3ioX8Cy

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks