General

  • Target

    4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c

  • Size

    657KB

  • Sample

    241105-2f3mkaspbn

  • MD5

    e79eb1a5050b2992234fed03bb05326f

  • SHA1

    66851ffdf1b9974c9d360cd1d3c1b33cb295dd1c

  • SHA256

    4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c

  • SHA512

    d0b6bd60dddd8fb61096a885d20dbfc5a0d4f05e1c7be49fd4df4b52eb43315595fb3c52f207bf7f4e349ebce9e5011927e17aa8fd26957e7dc8c668d779c04c

  • SSDEEP

    12288:aMrWy90gvWIE9cbnxj+sY06GY8yfKIjSZud4bC5l7LIU+ECZxV/Wn6Dt:4yTvL5bxqiifhLLn+ECzft

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c

    • Size

      657KB

    • MD5

      e79eb1a5050b2992234fed03bb05326f

    • SHA1

      66851ffdf1b9974c9d360cd1d3c1b33cb295dd1c

    • SHA256

      4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c

    • SHA512

      d0b6bd60dddd8fb61096a885d20dbfc5a0d4f05e1c7be49fd4df4b52eb43315595fb3c52f207bf7f4e349ebce9e5011927e17aa8fd26957e7dc8c668d779c04c

    • SSDEEP

      12288:aMrWy90gvWIE9cbnxj+sY06GY8yfKIjSZud4bC5l7LIU+ECZxV/Wn6Dt:4yTvL5bxqiifhLLn+ECzft

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks