General

  • Target

    dc96e2232a50d2f9c21ad59449ec6e769707996eb88d224aaa935d2ee18aa6fb

  • Size

    405KB

  • Sample

    241118-gnfgsa1ajm

  • MD5

    4b1fadcb017fda86f9c3652acc39d0f3

  • SHA1

    7da152cd0cddee2ef678ae3ee3a140d6518b7337

  • SHA256

    dc96e2232a50d2f9c21ad59449ec6e769707996eb88d224aaa935d2ee18aa6fb

  • SHA512

    9f645ee3e1edd29ed7168bb0fa7c4c930cdb7e2e4d2d507ed9b0d0e434d09f944b9ea75327835828c1dec2de4ebacdfb2cf4c2997be3dae648ae25ff8a5d914a

  • SSDEEP

    6144:K/y+bnr+wp0yN90QEl8XPNYL6wnO0c/RVH6loZQtPzW/iqEUUvhb3ZSEG3/iu1HL:BMrwy90zKPN4nVIOi6qXUjpGPp1Hrv

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Targets

    • Target

      dc96e2232a50d2f9c21ad59449ec6e769707996eb88d224aaa935d2ee18aa6fb

    • Size

      405KB

    • MD5

      4b1fadcb017fda86f9c3652acc39d0f3

    • SHA1

      7da152cd0cddee2ef678ae3ee3a140d6518b7337

    • SHA256

      dc96e2232a50d2f9c21ad59449ec6e769707996eb88d224aaa935d2ee18aa6fb

    • SHA512

      9f645ee3e1edd29ed7168bb0fa7c4c930cdb7e2e4d2d507ed9b0d0e434d09f944b9ea75327835828c1dec2de4ebacdfb2cf4c2997be3dae648ae25ff8a5d914a

    • SSDEEP

      6144:K/y+bnr+wp0yN90QEl8XPNYL6wnO0c/RVH6loZQtPzW/iqEUUvhb3ZSEG3/iu1HL:BMrwy90zKPN4nVIOi6qXUjpGPp1Hrv

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks