General

  • Target

    debbfa87c65395550d4f739d0fc7cf6f16ebaab0d83a8175f8a5b60748256d4eN.exe

  • Size

    401KB

  • Sample

    241119-r8bz7syajp

  • MD5

    445788c6b17d85b67f46f34cd61ad080

  • SHA1

    b58bc80b986d53697fda28891e94279bbef594ba

  • SHA256

    debbfa87c65395550d4f739d0fc7cf6f16ebaab0d83a8175f8a5b60748256d4e

  • SHA512

    3c67f3f9793896cc2465c9c146ab5eb5531d2ffd0464ebcb8d376533a716c1de5b60dbe2e2bf05a3e2e4130e4f9368e2b2eb45a63551af38677e26daaaf8215b

  • SSDEEP

    6144:KMy+bnr+sp0yN90QEY8RQVS2zq/jljk7BsqkmDxaHF9PSdma:QMr8y90+8nljkQLl9Kx

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Targets

    • Target

      debbfa87c65395550d4f739d0fc7cf6f16ebaab0d83a8175f8a5b60748256d4eN.exe

    • Size

      401KB

    • MD5

      445788c6b17d85b67f46f34cd61ad080

    • SHA1

      b58bc80b986d53697fda28891e94279bbef594ba

    • SHA256

      debbfa87c65395550d4f739d0fc7cf6f16ebaab0d83a8175f8a5b60748256d4e

    • SHA512

      3c67f3f9793896cc2465c9c146ab5eb5531d2ffd0464ebcb8d376533a716c1de5b60dbe2e2bf05a3e2e4130e4f9368e2b2eb45a63551af38677e26daaaf8215b

    • SSDEEP

      6144:KMy+bnr+sp0yN90QEY8RQVS2zq/jljk7BsqkmDxaHF9PSdma:QMr8y90+8nljkQLl9Kx

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks