General

  • Target

    6853a494b19350267fcc5dedbdd0b9aab6b81d7047b735c24513750a33796890.exe

  • Size

    1.1MB

  • Sample

    241114-he2t4avgra

  • MD5

    1b1a7f17da21c7b4c92ee47e1a6ed89d

  • SHA1

    85e120d1288ada50739e5a8c2504979fd4e75e51

  • SHA256

    6853a494b19350267fcc5dedbdd0b9aab6b81d7047b735c24513750a33796890

  • SHA512

    aca9fe0ee3b8e14e6396c4841141799543da9f8dd7e629c04e79244466c04c1227ff2117b7e03f75594df338d43bc35f7258970bec72e4c414e68a5c73af4b15

  • SSDEEP

    24576:By+OeVYkb1l2roMVqLsPtBjHiWxkdonfP8qXg:0HeKkDWmIBGckdofP8qQ

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      6853a494b19350267fcc5dedbdd0b9aab6b81d7047b735c24513750a33796890.exe

    • Size

      1.1MB

    • MD5

      1b1a7f17da21c7b4c92ee47e1a6ed89d

    • SHA1

      85e120d1288ada50739e5a8c2504979fd4e75e51

    • SHA256

      6853a494b19350267fcc5dedbdd0b9aab6b81d7047b735c24513750a33796890

    • SHA512

      aca9fe0ee3b8e14e6396c4841141799543da9f8dd7e629c04e79244466c04c1227ff2117b7e03f75594df338d43bc35f7258970bec72e4c414e68a5c73af4b15

    • SSDEEP

      24576:By+OeVYkb1l2roMVqLsPtBjHiWxkdonfP8qXg:0HeKkDWmIBGckdofP8qQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks