General

  • Target

    9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8N.exe

  • Size

    955KB

  • Sample

    241118-xzzykasrhw

  • MD5

    ca1c395095005fd1eec0d73aee1311a0

  • SHA1

    4b64467a9d43c55f82b26809f690ab688f67686d

  • SHA256

    9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8

  • SHA512

    9747d22b34cbb79ce67c31f12a0120ae6dbae21a40b43d35ed0a1f217e11b22a244a3456855fe1616d8abfe402a6ba95c8eb1000456203ef9d0426b87b3d2b5e

  • SSDEEP

    24576:7yl3lTgF4pZ+y1g1nIqyzo12Cf/YiyiKCNS:upyFC4I10n/YIKS

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8N.exe

    • Size

      955KB

    • MD5

      ca1c395095005fd1eec0d73aee1311a0

    • SHA1

      4b64467a9d43c55f82b26809f690ab688f67686d

    • SHA256

      9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8

    • SHA512

      9747d22b34cbb79ce67c31f12a0120ae6dbae21a40b43d35ed0a1f217e11b22a244a3456855fe1616d8abfe402a6ba95c8eb1000456203ef9d0426b87b3d2b5e

    • SSDEEP

      24576:7yl3lTgF4pZ+y1g1nIqyzo12Cf/YiyiKCNS:upyFC4I10n/YIKS

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks