General

  • Target

    1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe

  • Size

    1.2MB

  • Sample

    241210-jfcf9stpej

  • MD5

    7a4fec1d8431b18437caa70d74727df1

  • SHA1

    7e61cbde9d11554b530704cab3286a3b4f677625

  • SHA256

    1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f

  • SHA512

    03d06c54b200303600a08c713245e089153a431ae762082cc8a6a8ec17305de789aef6da7728dcdc0cf07218a82bb0da56d73e62fddbb359be34fce7bfac33c3

  • SSDEEP

    24576:1y8CI6ejP2HKUVxh4nhfaAuELGGsLm1PytSq+XSWNBL6SQRwU9/pj3L+fZVXunxj:QG6u2HKUfh4nhf0ELBsLm1P+v0SWNBLE

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe

    • Size

      1.2MB

    • MD5

      7a4fec1d8431b18437caa70d74727df1

    • SHA1

      7e61cbde9d11554b530704cab3286a3b4f677625

    • SHA256

      1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f

    • SHA512

      03d06c54b200303600a08c713245e089153a431ae762082cc8a6a8ec17305de789aef6da7728dcdc0cf07218a82bb0da56d73e62fddbb359be34fce7bfac33c3

    • SSDEEP

      24576:1y8CI6ejP2HKUVxh4nhfaAuELGGsLm1PytSq+XSWNBL6SQRwU9/pj3L+fZVXunxj:QG6u2HKUfh4nhf0ELBsLm1P+v0SWNBLE

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks