General

  • Target

    c46b5113cafff9d66873fd727903aec2d9eb2524d78df760bf395877bc20a804N.exe

  • Size

    307KB

  • Sample

    241123-bhyhhstnh1

  • MD5

    5ea29ece59133759dfec863fadbbb080

  • SHA1

    9d3edbffa92e9c7ea50fd22de41299fcfef37593

  • SHA256

    c46b5113cafff9d66873fd727903aec2d9eb2524d78df760bf395877bc20a804

  • SHA512

    eee215bacd3a5dbd9b5c08584b9c874cfe624c6fbff482d46be54b87a9f57670a47b77f64752e2aee012f66de507ea217c424e8ef0d99315568789966200cba1

  • SSDEEP

    6144:K5y+bnr+hp0yN90QEQ5F5OYc1u31g4TBy+1qJT4MCVzSpEt3tKDfpjwl:bMrVy90Sxc1u31TTE+1l4pEt3t3

Malware Config

Extracted

Family

redline

Botnet

mufos

C2

217.196.96.102:4132

Attributes
  • auth_value

    136f202e6569ad5815c34377858a255c

Targets

    • Target

      c46b5113cafff9d66873fd727903aec2d9eb2524d78df760bf395877bc20a804N.exe

    • Size

      307KB

    • MD5

      5ea29ece59133759dfec863fadbbb080

    • SHA1

      9d3edbffa92e9c7ea50fd22de41299fcfef37593

    • SHA256

      c46b5113cafff9d66873fd727903aec2d9eb2524d78df760bf395877bc20a804

    • SHA512

      eee215bacd3a5dbd9b5c08584b9c874cfe624c6fbff482d46be54b87a9f57670a47b77f64752e2aee012f66de507ea217c424e8ef0d99315568789966200cba1

    • SSDEEP

      6144:K5y+bnr+hp0yN90QEQ5F5OYc1u31g4TBy+1qJT4MCVzSpEt3tKDfpjwl:bMrVy90Sxc1u31TTE+1l4pEt3t3

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks