General

  • Target

    748f465a94da22aa3b4e192d2c71121e0aec2c94fa99b8a4b8f753af7260d6dd

  • Size

    689KB

  • Sample

    241105-1vt4asskdl

  • MD5

    e1ce38e2a301ee1c47e15eefd853bec1

  • SHA1

    b6861f3f7639d8480d9c65b7654fa80971ed0e67

  • SHA256

    748f465a94da22aa3b4e192d2c71121e0aec2c94fa99b8a4b8f753af7260d6dd

  • SHA512

    52c72ac17ca177a533c366637f242f537a2b184f9943768e04212d624492a41d40fc5e79b20a5933537d4aef2ffe9db1bba2f9a4aeff92cb454d02bafb2679c0

  • SSDEEP

    12288:JMr0y90nUO+0KlS9YAYZ9nW1hWv4l05ph3m679sxkOOYWRV:9ymUt0Kwr0W1WlD77i2OOY8

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      748f465a94da22aa3b4e192d2c71121e0aec2c94fa99b8a4b8f753af7260d6dd

    • Size

      689KB

    • MD5

      e1ce38e2a301ee1c47e15eefd853bec1

    • SHA1

      b6861f3f7639d8480d9c65b7654fa80971ed0e67

    • SHA256

      748f465a94da22aa3b4e192d2c71121e0aec2c94fa99b8a4b8f753af7260d6dd

    • SHA512

      52c72ac17ca177a533c366637f242f537a2b184f9943768e04212d624492a41d40fc5e79b20a5933537d4aef2ffe9db1bba2f9a4aeff92cb454d02bafb2679c0

    • SSDEEP

      12288:JMr0y90nUO+0KlS9YAYZ9nW1hWv4l05ph3m679sxkOOYWRV:9ymUt0Kwr0W1WlD77i2OOY8

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks