General

  • Target

    3b3d4f7e5431c7e9ca5b6062bdc0f372757468b19d480913506140965c62e767

  • Size

    530KB

  • Sample

    241105-jb19tsxhnk

  • MD5

    8f12465fdd555102d9ebb663cd144bd6

  • SHA1

    4f6960d0a7aba4b0e3d43baba254ca3f65680a52

  • SHA256

    3b3d4f7e5431c7e9ca5b6062bdc0f372757468b19d480913506140965c62e767

  • SHA512

    2d9f8259e81df8393deb91da957f2b7a8c0dee38f9428e202f12af2f20c19b8fd23f33c8fce8c0abbb2211e9e17df78ff268b16dd4e49fb719ca937589962a6e

  • SSDEEP

    12288:iMrYy90CONINcG35bGb7ONYXQN8xrI0WV+7Xw3zE8V:WyHOq135bG7OYAN8l5W3g8V

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      3b3d4f7e5431c7e9ca5b6062bdc0f372757468b19d480913506140965c62e767

    • Size

      530KB

    • MD5

      8f12465fdd555102d9ebb663cd144bd6

    • SHA1

      4f6960d0a7aba4b0e3d43baba254ca3f65680a52

    • SHA256

      3b3d4f7e5431c7e9ca5b6062bdc0f372757468b19d480913506140965c62e767

    • SHA512

      2d9f8259e81df8393deb91da957f2b7a8c0dee38f9428e202f12af2f20c19b8fd23f33c8fce8c0abbb2211e9e17df78ff268b16dd4e49fb719ca937589962a6e

    • SSDEEP

      12288:iMrYy90CONINcG35bGb7ONYXQN8xrI0WV+7Xw3zE8V:WyHOq135bG7OYAN8l5W3g8V

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks