General

  • Target

    148735c3c24a208736cf42516ab735f1a92452c30108ef3bc08812f256c60353

  • Size

    666KB

  • Sample

    241105-3h6bxa1cph

  • MD5

    ec74db71357d521f49434b0ba2ff0ce9

  • SHA1

    4f27b93f9c3db1b712301e5cd455c4a624440ed5

  • SHA256

    148735c3c24a208736cf42516ab735f1a92452c30108ef3bc08812f256c60353

  • SHA512

    95dc20b3bfd0d7d1d2306ea1239e657916acc7e89af8b5475d4328d48bdcb7ea41ce97739e389d9dc9f8b13e32091b384353def41c0467dbb1977e85ee6fbd69

  • SSDEEP

    12288:kMr6y90WbARRtThnOHi6DdyzNPMw4LA5OwYMHG1mavPJJSMMfG:GyVA7tNlogzNPP4kDDGcaHSMMfG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      148735c3c24a208736cf42516ab735f1a92452c30108ef3bc08812f256c60353

    • Size

      666KB

    • MD5

      ec74db71357d521f49434b0ba2ff0ce9

    • SHA1

      4f27b93f9c3db1b712301e5cd455c4a624440ed5

    • SHA256

      148735c3c24a208736cf42516ab735f1a92452c30108ef3bc08812f256c60353

    • SHA512

      95dc20b3bfd0d7d1d2306ea1239e657916acc7e89af8b5475d4328d48bdcb7ea41ce97739e389d9dc9f8b13e32091b384353def41c0467dbb1977e85ee6fbd69

    • SSDEEP

      12288:kMr6y90WbARRtThnOHi6DdyzNPMw4LA5OwYMHG1mavPJJSMMfG:GyVA7tNlogzNPP4kDDGcaHSMMfG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks