General

  • Target

    eb2796e4883f6f7a587a4e879635e6b913a3353cd73c2368313729e4b906c9e1

  • Size

    530KB

  • Sample

    241104-q13mhstjbr

  • MD5

    605144475b405341269e44db1425e084

  • SHA1

    ac444571b2910f6ea084ba687810e6612694e992

  • SHA256

    eb2796e4883f6f7a587a4e879635e6b913a3353cd73c2368313729e4b906c9e1

  • SHA512

    a1a330fa472b50e53fa3349989f73ab835ed1b94b4be9b78565b158f643582b8e55c3afad1c8578e0a1f7264aeff43056f39ef7f16ddfc34496ddf0f2a8856ff

  • SSDEEP

    12288:RMrwy90oIsNOWKrIu4f5KXa/dmmjjs85Rm/8e:VyDO9ILA+mmXs85RQ8e

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      eb2796e4883f6f7a587a4e879635e6b913a3353cd73c2368313729e4b906c9e1

    • Size

      530KB

    • MD5

      605144475b405341269e44db1425e084

    • SHA1

      ac444571b2910f6ea084ba687810e6612694e992

    • SHA256

      eb2796e4883f6f7a587a4e879635e6b913a3353cd73c2368313729e4b906c9e1

    • SHA512

      a1a330fa472b50e53fa3349989f73ab835ed1b94b4be9b78565b158f643582b8e55c3afad1c8578e0a1f7264aeff43056f39ef7f16ddfc34496ddf0f2a8856ff

    • SSDEEP

      12288:RMrwy90oIsNOWKrIu4f5KXa/dmmjjs85Rm/8e:VyDO9ILA+mmXs85RQ8e

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks