General

  • Target

    virussign.com_7aaf9f676aaa6e8b23968e385f84bc2e.vir

  • Size

    1.1MB

  • Sample

    240303-kzv86agc4s

  • MD5

    7aaf9f676aaa6e8b23968e385f84bc2e

  • SHA1

    5d058a78d2f6210f366f7e21102b0d9148d40f75

  • SHA256

    1ff8f6e55ed2f5cc79a32a0560c02231e2089c4c5a2193dbbd2ac5955e5bcd12

  • SHA512

    d8e3314ba52c42f92cac821bca4da841a5cb2bb53e41226074bc1ce3a5f6407549e509d2cb8f45155c802f8e282e0e0474a5c1f72c45fbc5da88ad07c660261a

  • SSDEEP

    24576:eyLmeR3kpJ0sVGxb1gUD4HFKhpHh3SpTmzM9zaFiyK9MVVLjD9lkutA1Q:tbRuJTGxb1DD4EHhiTOF0MVVLl24A1

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Targets

    • Target

      virussign.com_7aaf9f676aaa6e8b23968e385f84bc2e.vir

    • Size

      1.1MB

    • MD5

      7aaf9f676aaa6e8b23968e385f84bc2e

    • SHA1

      5d058a78d2f6210f366f7e21102b0d9148d40f75

    • SHA256

      1ff8f6e55ed2f5cc79a32a0560c02231e2089c4c5a2193dbbd2ac5955e5bcd12

    • SHA512

      d8e3314ba52c42f92cac821bca4da841a5cb2bb53e41226074bc1ce3a5f6407549e509d2cb8f45155c802f8e282e0e0474a5c1f72c45fbc5da88ad07c660261a

    • SSDEEP

      24576:eyLmeR3kpJ0sVGxb1gUD4HFKhpHh3SpTmzM9zaFiyK9MVVLjD9lkutA1Q:tbRuJTGxb1DD4EHhiTOF0MVVLl24A1

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks