General

  • Target

    92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764

  • Size

    521KB

  • Sample

    241104-qx5mps1clm

  • MD5

    37b513dd6ae7c4d06f3ec87cc41670d4

  • SHA1

    56ac7987bd27d1edcbcc4e1bcc09634544ffdbc4

  • SHA256

    92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764

  • SHA512

    9b881362825d65c48483232b160258ae0a320f91cf68705a0e0f656341ac2b6d5b431f78103bdc2ed3162f200cb47efb0be62f9bb8eed0ed3a6ba5a8c9c8b77c

  • SSDEEP

    6144:KLy+bnr+ap0yN90QE+JIF8hw91bbJTkggLGqI+4KxmU7lhkg32FR3Be4ppBqqZae:hMrOy90EJCISbb+6qEmmKkgmb3TLnkE

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764

    • Size

      521KB

    • MD5

      37b513dd6ae7c4d06f3ec87cc41670d4

    • SHA1

      56ac7987bd27d1edcbcc4e1bcc09634544ffdbc4

    • SHA256

      92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764

    • SHA512

      9b881362825d65c48483232b160258ae0a320f91cf68705a0e0f656341ac2b6d5b431f78103bdc2ed3162f200cb47efb0be62f9bb8eed0ed3a6ba5a8c9c8b77c

    • SSDEEP

      6144:KLy+bnr+ap0yN90QE+JIF8hw91bbJTkggLGqI+4KxmU7lhkg32FR3Be4ppBqqZae:hMrOy90EJCISbb+6qEmmKkgmb3TLnkE

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks