General

  • Target

    2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9fN.exe

  • Size

    1.2MB

  • Sample

    241211-hxrf3sslaz

  • MD5

    4d3b49d1786dbcd9ee3c809dfae17a20

  • SHA1

    87c30697b5a2621d05dfbfc3e4c80c21522acdab

  • SHA256

    2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9f

  • SHA512

    914148ee76d79a66d0ad5c265cbaf094a364e39d550e0c45981f1c9d0e2977cc5c9ca2d435bb987c38fa9a12cd3817e75dc2b7026dfea50c00313ae90dec8d90

  • SSDEEP

    24576:1y8CI6ejP2HKUVxh4nhfaAuELGGsLm1PytSq+XSWNBL6SQRwU9/pj3L+fZVXunxY:QG6u2HKUfh4nhf0ELBsLm1P+v0SWNBLI

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9fN.exe

    • Size

      1.2MB

    • MD5

      4d3b49d1786dbcd9ee3c809dfae17a20

    • SHA1

      87c30697b5a2621d05dfbfc3e4c80c21522acdab

    • SHA256

      2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9f

    • SHA512

      914148ee76d79a66d0ad5c265cbaf094a364e39d550e0c45981f1c9d0e2977cc5c9ca2d435bb987c38fa9a12cd3817e75dc2b7026dfea50c00313ae90dec8d90

    • SSDEEP

      24576:1y8CI6ejP2HKUVxh4nhfaAuELGGsLm1PytSq+XSWNBL6SQRwU9/pj3L+fZVXunxY:QG6u2HKUfh4nhf0ELBsLm1P+v0SWNBLI

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks