General

  • Target

    20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39

  • Size

    1.3MB

  • Sample

    250118-z42ztswjhn

  • MD5

    7980d99f45fbdbce92c3c62a0332b376

  • SHA1

    6694940c2f13486c0a1bc76b0cd35c90687b2537

  • SHA256

    20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39

  • SHA512

    1b6d11c6ab6effd3095cd5b351177400b03cae65b5d944570ddd080ab605b16b351888767ec58cdd75048f352c15b39deb79cb61c8df761896938e46b247a7a2

  • SSDEEP

    24576:0RJIrpWaTHaEQbav1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:0cFWaDZQ2jLoyEkmZ9Y14

Malware Config

Extracted

Family

redline

Botnet

redko

C2

62.204.41.170:4179

Attributes
  • auth_value

    9bcf7b0620ff067017d66b9a5d80b547

Targets

    • Target

      20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39

    • Size

      1.3MB

    • MD5

      7980d99f45fbdbce92c3c62a0332b376

    • SHA1

      6694940c2f13486c0a1bc76b0cd35c90687b2537

    • SHA256

      20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39

    • SHA512

      1b6d11c6ab6effd3095cd5b351177400b03cae65b5d944570ddd080ab605b16b351888767ec58cdd75048f352c15b39deb79cb61c8df761896938e46b247a7a2

    • SSDEEP

      24576:0RJIrpWaTHaEQbav1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:0cFWaDZQ2jLoyEkmZ9Y14

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks