General

  • Target

    2bc7a028782d574bddf59e41863d8177be04a52606a5bf4b8b6c322c689a7884

  • Size

    559KB

  • Sample

    241105-fh6aksxnap

  • MD5

    e73906ba99b4d690f5a7077d18391224

  • SHA1

    338a98cf082ff690ca37879656ce2b256ebb59ed

  • SHA256

    2bc7a028782d574bddf59e41863d8177be04a52606a5bf4b8b6c322c689a7884

  • SHA512

    c618c4a7a299325d42c2e203cd268a299f8a389847de438bf9d8cc3ff683bcce8233aec661a5460ae84642dce20549bf4094f8139ac5c9b59ff7f91792a472bc

  • SSDEEP

    12288:YMray90C2aGOhzmS67C8mpbcRorjmBQYvWbkq:iyVJA2pb9eBQFIq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      2bc7a028782d574bddf59e41863d8177be04a52606a5bf4b8b6c322c689a7884

    • Size

      559KB

    • MD5

      e73906ba99b4d690f5a7077d18391224

    • SHA1

      338a98cf082ff690ca37879656ce2b256ebb59ed

    • SHA256

      2bc7a028782d574bddf59e41863d8177be04a52606a5bf4b8b6c322c689a7884

    • SHA512

      c618c4a7a299325d42c2e203cd268a299f8a389847de438bf9d8cc3ff683bcce8233aec661a5460ae84642dce20549bf4094f8139ac5c9b59ff7f91792a472bc

    • SSDEEP

      12288:YMray90C2aGOhzmS67C8mpbcRorjmBQYvWbkq:iyVJA2pb9eBQFIq

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks