General

  • Target

    b7f104963c2435cc0c0bb2bcaf4039ac8d1b2b11f192ccbb2510f5c0f04ad2fa

  • Size

    402KB

  • Sample

    241123-ddf4sasngk

  • MD5

    3e11890c26fe5ac07f01d302e1959547

  • SHA1

    8ba4864dc06021b65f8b479de259facf7cceeff8

  • SHA256

    b7f104963c2435cc0c0bb2bcaf4039ac8d1b2b11f192ccbb2510f5c0f04ad2fa

  • SHA512

    a1d29c791a51ef1688ea9f4580e6a6fac1487598dd668b1622a972fafa7e6d4593fb644e963f7b35e6121e4053b49b95abfc2758fec38bc5257c6f9c11391bdc

  • SSDEEP

    12288:8Mr+y90+qWYdxQxef10ObMYqgUVMLjwXZ++XPlb:ayVpQz0MvA1XP1

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Targets

    • Target

      b7f104963c2435cc0c0bb2bcaf4039ac8d1b2b11f192ccbb2510f5c0f04ad2fa

    • Size

      402KB

    • MD5

      3e11890c26fe5ac07f01d302e1959547

    • SHA1

      8ba4864dc06021b65f8b479de259facf7cceeff8

    • SHA256

      b7f104963c2435cc0c0bb2bcaf4039ac8d1b2b11f192ccbb2510f5c0f04ad2fa

    • SHA512

      a1d29c791a51ef1688ea9f4580e6a6fac1487598dd668b1622a972fafa7e6d4593fb644e963f7b35e6121e4053b49b95abfc2758fec38bc5257c6f9c11391bdc

    • SSDEEP

      12288:8Mr+y90+qWYdxQxef10ObMYqgUVMLjwXZ++XPlb:ayVpQz0MvA1XP1

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks