General

  • Target

    3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e

  • Size

    673KB

  • Sample

    241104-rgprzs1eqr

  • MD5

    f19caeabe2cff502ca59039ac5487d51

  • SHA1

    7c1b1f94a07f83522a8ef5feb9e5019aba22411b

  • SHA256

    3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e

  • SHA512

    4a8d502449aba8b21e7bc923e0e71aa6e0bd7068d2d4aa34e69724f619c6a5f09d423686ad10d94fc4b347ae69bb92e65bbc01f030704c7b5f7326fdfc31ad72

  • SSDEEP

    12288:tMr4y90tF0CTg4MgqqQpLfUt3N6J3hZ1buWUswnOq49C:dyK0qg4MgqqKxJ3hZZuDy9C

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e

    • Size

      673KB

    • MD5

      f19caeabe2cff502ca59039ac5487d51

    • SHA1

      7c1b1f94a07f83522a8ef5feb9e5019aba22411b

    • SHA256

      3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e

    • SHA512

      4a8d502449aba8b21e7bc923e0e71aa6e0bd7068d2d4aa34e69724f619c6a5f09d423686ad10d94fc4b347ae69bb92e65bbc01f030704c7b5f7326fdfc31ad72

    • SSDEEP

      12288:tMr4y90tF0CTg4MgqqQpLfUt3N6J3hZ1buWUswnOq49C:dyK0qg4MgqqKxJ3hZZuDy9C

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks