General

  • Target

    ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61

  • Size

    522KB

  • Sample

    241105-1l6ezaylfz

  • MD5

    653e4e2d89abbbff09677f408db5bf0a

  • SHA1

    82771db98be7254ca83c499c20c4aa305abfb7fb

  • SHA256

    ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61

  • SHA512

    d041cbc49f126d416b9ebac36dfbf0aa6c3abf08074c9aba5aae1e25f86c7fa83aa19870d99827ebdcd74d60983ac25a73885fd8f47e2149457ec75bc6e6de4c

  • SSDEEP

    6144:Kcy+bnr+Dp0yN90QEg1CkT88zr6ouILRQN1B7INYNM532/FdmRJioM23EL/zMWge:kMrjy908CZ8AISfWNL329yEMEdgzcCu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61

    • Size

      522KB

    • MD5

      653e4e2d89abbbff09677f408db5bf0a

    • SHA1

      82771db98be7254ca83c499c20c4aa305abfb7fb

    • SHA256

      ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61

    • SHA512

      d041cbc49f126d416b9ebac36dfbf0aa6c3abf08074c9aba5aae1e25f86c7fa83aa19870d99827ebdcd74d60983ac25a73885fd8f47e2149457ec75bc6e6de4c

    • SSDEEP

      6144:Kcy+bnr+Dp0yN90QEg1CkT88zr6ouILRQN1B7INYNM532/FdmRJioM23EL/zMWge:kMrjy908CZ8AISfWNL329yEMEdgzcCu

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks