General

  • Target

    4da138de8bf9c95b25eed52e7738aa41d497fc1eb08ad6beb62de1309e09d36c

  • Size

    696KB

  • Sample

    241105-2b96va1amp

  • MD5

    760db1c7e47f33fd7929f5cccf2a50cd

  • SHA1

    9a1afa6fb14608aeb26cc1e82bb33aaf22641ff0

  • SHA256

    4da138de8bf9c95b25eed52e7738aa41d497fc1eb08ad6beb62de1309e09d36c

  • SHA512

    3314022c16e9913fbbf8b2c22d738ca6a7fcfef65c8146797f27ad67d4acda5fcf9588fcb2b54896921304cd6991752873867c094a9924843028d61435fa74b4

  • SSDEEP

    12288:uMrwy90CfH0dLgueLtDm2itDWPz4V46tKIDdYM3WdSRXxCLvFHU3qba:+yZELheLtDmvtv66bDCaXGpUn

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      4da138de8bf9c95b25eed52e7738aa41d497fc1eb08ad6beb62de1309e09d36c

    • Size

      696KB

    • MD5

      760db1c7e47f33fd7929f5cccf2a50cd

    • SHA1

      9a1afa6fb14608aeb26cc1e82bb33aaf22641ff0

    • SHA256

      4da138de8bf9c95b25eed52e7738aa41d497fc1eb08ad6beb62de1309e09d36c

    • SHA512

      3314022c16e9913fbbf8b2c22d738ca6a7fcfef65c8146797f27ad67d4acda5fcf9588fcb2b54896921304cd6991752873867c094a9924843028d61435fa74b4

    • SSDEEP

      12288:uMrwy90CfH0dLgueLtDm2itDWPz4V46tKIDdYM3WdSRXxCLvFHU3qba:+yZELheLtDmvtv66bDCaXGpUn

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks