General

  • Target

    8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b

  • Size

    696KB

  • Sample

    241104-rpshva1frq

  • MD5

    6d65de5263a5230a9f228694231eea60

  • SHA1

    f12c169f479b538e3b7072ae49d8230392cf1e3e

  • SHA256

    8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b

  • SHA512

    1351de48806ac0c1bf298974edbfb11e42e301c618c12e556028c2df082f9b87d6f515032e2dc0ed914963a8336ea45ce25b0a1cad68662564eb94a1ddd1c8ba

  • SSDEEP

    12288:QMrty90TJnfCRyIyp0kqzpyGGe9+soOoGpCSe1k5obR8D+Fz:tyuckSpy24iIp5t8D+h

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b

    • Size

      696KB

    • MD5

      6d65de5263a5230a9f228694231eea60

    • SHA1

      f12c169f479b538e3b7072ae49d8230392cf1e3e

    • SHA256

      8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b

    • SHA512

      1351de48806ac0c1bf298974edbfb11e42e301c618c12e556028c2df082f9b87d6f515032e2dc0ed914963a8336ea45ce25b0a1cad68662564eb94a1ddd1c8ba

    • SSDEEP

      12288:QMrty90TJnfCRyIyp0kqzpyGGe9+soOoGpCSe1k5obR8D+Fz:tyuckSpy24iIp5t8D+h

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks