General

  • Target

    332a7737dffa5469150cc97dd711a3350bf102ac64a5d42930272eb2bdee5ac7N.exe

  • Size

    385KB

  • Sample

    241119-fc9qta1ejk

  • MD5

    dbf8cb92fe5004fab5a6ea4118492e80

  • SHA1

    838dcc5d833baae4b85195370602245a2eb95fe2

  • SHA256

    332a7737dffa5469150cc97dd711a3350bf102ac64a5d42930272eb2bdee5ac7

  • SHA512

    0b75c8ffcc028d9cc9617aaba0d2bcbf4492ce7ea07c447427d44e98d47a8a2df5a7177d11a2d1e68f5ec0e976f367bff0dd3f6888023ef6601da299c9f8b5cc

  • SSDEEP

    6144:KPy+bnr+Dp0yN90QEphcOWDWHm0snFyA55kiJDl5ZY3ZZReRKZMXGER3LXPui8om:9Mr3y90GO1Hm0SVNjEJZ4RNXG4L/uQC

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      332a7737dffa5469150cc97dd711a3350bf102ac64a5d42930272eb2bdee5ac7N.exe

    • Size

      385KB

    • MD5

      dbf8cb92fe5004fab5a6ea4118492e80

    • SHA1

      838dcc5d833baae4b85195370602245a2eb95fe2

    • SHA256

      332a7737dffa5469150cc97dd711a3350bf102ac64a5d42930272eb2bdee5ac7

    • SHA512

      0b75c8ffcc028d9cc9617aaba0d2bcbf4492ce7ea07c447427d44e98d47a8a2df5a7177d11a2d1e68f5ec0e976f367bff0dd3f6888023ef6601da299c9f8b5cc

    • SSDEEP

      6144:KPy+bnr+Dp0yN90QEphcOWDWHm0snFyA55kiJDl5ZY3ZZReRKZMXGER3LXPui8om:9Mr3y90GO1Hm0SVNjEJZ4RNXG4L/uQC

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks