General

  • Target

    3e748ff735d10a8aa5e0a6c8925d2852a3173df3d8beb1d5d422ea7f9f8eeb08.exe

  • Size

    381KB

  • Sample

    241118-pevjcawhll

  • MD5

    dbf0a44ba1d685e731eb23b39f794dad

  • SHA1

    d75f32f47a14be0438d6a1c8bff839d117ec78a2

  • SHA256

    3e748ff735d10a8aa5e0a6c8925d2852a3173df3d8beb1d5d422ea7f9f8eeb08

  • SHA512

    9c7d4429abf66456ddffc77075361d26783971340da9384fd72746a05435ec2c767691f87d5f5132dc33d70d83da6b8db3689ccd9a093a3d2f333bbf9b84f1f4

  • SSDEEP

    6144:KEy+bnr+Vp0yN90QEyExRxzI5kv+NXBYC4wkMuZ7OPhL5c4GKEi51xwBv:IMrRy908ExRBpGNXSJMu0Z1TGKEi5fwN

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      3e748ff735d10a8aa5e0a6c8925d2852a3173df3d8beb1d5d422ea7f9f8eeb08.exe

    • Size

      381KB

    • MD5

      dbf0a44ba1d685e731eb23b39f794dad

    • SHA1

      d75f32f47a14be0438d6a1c8bff839d117ec78a2

    • SHA256

      3e748ff735d10a8aa5e0a6c8925d2852a3173df3d8beb1d5d422ea7f9f8eeb08

    • SHA512

      9c7d4429abf66456ddffc77075361d26783971340da9384fd72746a05435ec2c767691f87d5f5132dc33d70d83da6b8db3689ccd9a093a3d2f333bbf9b84f1f4

    • SSDEEP

      6144:KEy+bnr+Vp0yN90QEyExRxzI5kv+NXBYC4wkMuZ7OPhL5c4GKEi51xwBv:IMrRy908ExRBpGNXSJMu0Z1TGKEi5fwN

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks