General

  • Target

    11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65

  • Size

    1006KB

  • Sample

    241104-rlj3aszpgy

  • MD5

    99d3a9ea736eadb4d10e17bb0fff22ac

  • SHA1

    d3f7020ee2249fe845a326b8bbca310de5c5bdda

  • SHA256

    11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65

  • SHA512

    19b75d61e19a2b541617d9bafdb99e8967a45b0e89908e75c8f334b3cffae544e5f56f63388d79a66a6c9e241344720489503e30482207092108c34aff0bd3de

  • SSDEEP

    24576:RypDpnXJV/EZYC6lqsvz+1kssaCNJa7nm/D0:E3nX/4yT61XygS/D

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65

    • Size

      1006KB

    • MD5

      99d3a9ea736eadb4d10e17bb0fff22ac

    • SHA1

      d3f7020ee2249fe845a326b8bbca310de5c5bdda

    • SHA256

      11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65

    • SHA512

      19b75d61e19a2b541617d9bafdb99e8967a45b0e89908e75c8f334b3cffae544e5f56f63388d79a66a6c9e241344720489503e30482207092108c34aff0bd3de

    • SSDEEP

      24576:RypDpnXJV/EZYC6lqsvz+1kssaCNJa7nm/D0:E3nX/4yT61XygS/D

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks