General

  • Target

    ab02b8b4eb13b9652a7261145ed134c76fd5017b3e1f556d03dda4aaaffc9e00

  • Size

    666KB

  • Sample

    241105-1q112szeqk

  • MD5

    bdcea0bbc83f644859872c3ddcd08552

  • SHA1

    1ed36bc946ba0df88ea902fec6aa392510bca77f

  • SHA256

    ab02b8b4eb13b9652a7261145ed134c76fd5017b3e1f556d03dda4aaaffc9e00

  • SHA512

    29d4f670b480b05e68b61064ddcd4447deee23ec0f84eef2b9caa34e5bf835168741a3055d8d3e2d5bf335a6e040126910596db22e5e1abdd14bb690386aee65

  • SSDEEP

    12288:gMrGy90nWiu0A+CyYdUcS1Sjb9o8b+vHVsvtnRc4l2ZtLNcbXX2EpTBll//iiX:WyxiuWCxFq7VsvtnRc48ZlNc6EpPd/BX

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      ab02b8b4eb13b9652a7261145ed134c76fd5017b3e1f556d03dda4aaaffc9e00

    • Size

      666KB

    • MD5

      bdcea0bbc83f644859872c3ddcd08552

    • SHA1

      1ed36bc946ba0df88ea902fec6aa392510bca77f

    • SHA256

      ab02b8b4eb13b9652a7261145ed134c76fd5017b3e1f556d03dda4aaaffc9e00

    • SHA512

      29d4f670b480b05e68b61064ddcd4447deee23ec0f84eef2b9caa34e5bf835168741a3055d8d3e2d5bf335a6e040126910596db22e5e1abdd14bb690386aee65

    • SSDEEP

      12288:gMrGy90nWiu0A+CyYdUcS1Sjb9o8b+vHVsvtnRc4l2ZtLNcbXX2EpTBll//iiX:WyxiuWCxFq7VsvtnRc48ZlNc6EpPd/BX

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks