General

  • Target

    dc8c1400157963ca589b84b40c04a0a6486453e7d61bba3e951fce65c979d6ee

  • Size

    530KB

  • Sample

    241105-3j4jpszphz

  • MD5

    ab3105555add0a4c64021d32ffe026da

  • SHA1

    4a6e9f842520c2a1e040068e1c8daa5540c66f05

  • SHA256

    dc8c1400157963ca589b84b40c04a0a6486453e7d61bba3e951fce65c979d6ee

  • SHA512

    4888461ae956792939334c4f7da50e332c5d415c756bd32a29ad27c8de47e5f60cbb28dfb000f9f0c36b608f48dd3377f8d94b31e1061497e2476b9509598ba1

  • SSDEEP

    12288:RMr8y90ncwjGTveh++4oYbJrBT2E87xIMg593Vyk9kgIZ:RyEj4S++kbT2E81vIFyMkPZ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      dc8c1400157963ca589b84b40c04a0a6486453e7d61bba3e951fce65c979d6ee

    • Size

      530KB

    • MD5

      ab3105555add0a4c64021d32ffe026da

    • SHA1

      4a6e9f842520c2a1e040068e1c8daa5540c66f05

    • SHA256

      dc8c1400157963ca589b84b40c04a0a6486453e7d61bba3e951fce65c979d6ee

    • SHA512

      4888461ae956792939334c4f7da50e332c5d415c756bd32a29ad27c8de47e5f60cbb28dfb000f9f0c36b608f48dd3377f8d94b31e1061497e2476b9509598ba1

    • SSDEEP

      12288:RMr8y90ncwjGTveh++4oYbJrBT2E87xIMg593Vyk9kgIZ:RyEj4S++kbT2E81vIFyMkPZ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks