General

  • Target

    3581d900dff3550e3fc55c0bba20ee9bcc7aa1496679a38c95e80488ac4b0720

  • Size

    531KB

  • Sample

    241105-3tsvystpgk

  • MD5

    61df1c89a3b18c6e1f5da3fe1663d30a

  • SHA1

    89c54ae9a4aa3d52a238601889e09b0e3fe288e9

  • SHA256

    3581d900dff3550e3fc55c0bba20ee9bcc7aa1496679a38c95e80488ac4b0720

  • SHA512

    c173c67169426327431fbabafbcf5f3a9cd4ba8c4c79cdc44b22d37f96b5b675de2c732da1bab84150f0840348fd912e4c0b2eb64c358a7a1c5dfe85e500a4e7

  • SSDEEP

    12288:bMruy90X5so/mkhH2LAiufuXC12CshIlxp:Vymv/QMz121IHp

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      3581d900dff3550e3fc55c0bba20ee9bcc7aa1496679a38c95e80488ac4b0720

    • Size

      531KB

    • MD5

      61df1c89a3b18c6e1f5da3fe1663d30a

    • SHA1

      89c54ae9a4aa3d52a238601889e09b0e3fe288e9

    • SHA256

      3581d900dff3550e3fc55c0bba20ee9bcc7aa1496679a38c95e80488ac4b0720

    • SHA512

      c173c67169426327431fbabafbcf5f3a9cd4ba8c4c79cdc44b22d37f96b5b675de2c732da1bab84150f0840348fd912e4c0b2eb64c358a7a1c5dfe85e500a4e7

    • SSDEEP

      12288:bMruy90X5so/mkhH2LAiufuXC12CshIlxp:Vymv/QMz121IHp

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks