General

  • Target

    d5aa236d912074c30f6637674001d16e405db42fe5f1f7375047fd8d0ef4e392

  • Size

    522KB

  • Sample

    241105-26p46atlbl

  • MD5

    a9389b6f99e92283c7ac985a92a70bcb

  • SHA1

    93f6bbbbc9262a12c26f4f161351a7371dedc4f6

  • SHA256

    d5aa236d912074c30f6637674001d16e405db42fe5f1f7375047fd8d0ef4e392

  • SHA512

    aae929f146c00749d20af0c670ad32c05ca52ea68ac9299034778ff7b69593a61c477bee046d66ec2521c24a3d86f6b5968b7c42866b4d2354eb40b75da0d475

  • SSDEEP

    12288:vMr+y90mu4HiIzk8ZP/v1Nm8s74PAzWKZYbftAFAlQ:1yHuQ/zk8Znv1NPskPJKZmtAKG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      d5aa236d912074c30f6637674001d16e405db42fe5f1f7375047fd8d0ef4e392

    • Size

      522KB

    • MD5

      a9389b6f99e92283c7ac985a92a70bcb

    • SHA1

      93f6bbbbc9262a12c26f4f161351a7371dedc4f6

    • SHA256

      d5aa236d912074c30f6637674001d16e405db42fe5f1f7375047fd8d0ef4e392

    • SHA512

      aae929f146c00749d20af0c670ad32c05ca52ea68ac9299034778ff7b69593a61c477bee046d66ec2521c24a3d86f6b5968b7c42866b4d2354eb40b75da0d475

    • SSDEEP

      12288:vMr+y90mu4HiIzk8ZP/v1Nm8s74PAzWKZYbftAFAlQ:1yHuQ/zk8Znv1NPskPJKZmtAKG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks