General

  • Target

    820b0a87ea75ddb38adaf629174dd060d4c6a0b8fae9d8a44fb0b5be22660c37

  • Size

    666KB

  • Sample

    241105-jyc6hsznhk

  • MD5

    79d25bacf38e71f9e2a213d8416aeae0

  • SHA1

    d4f2915c8890afdac083a5cf162de4ad3d1bb259

  • SHA256

    820b0a87ea75ddb38adaf629174dd060d4c6a0b8fae9d8a44fb0b5be22660c37

  • SHA512

    bfb02f8f49fa89813f691aca6ca5c1217caf3ea759f9d777337e6a7c1d67858c38aaa42bfa1d024702f6849cda884df33bdfd0e3fa041aecf4e8ccd0c53ecc97

  • SSDEEP

    12288:jMrMy90aGl5vADamMaxAS5U8UV9Mnz9GysYEhYs0jLYY21rUGvp/wciz722xOw:zyPcl8jK8UrW9GnIjLu1rHtwcin2K

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      820b0a87ea75ddb38adaf629174dd060d4c6a0b8fae9d8a44fb0b5be22660c37

    • Size

      666KB

    • MD5

      79d25bacf38e71f9e2a213d8416aeae0

    • SHA1

      d4f2915c8890afdac083a5cf162de4ad3d1bb259

    • SHA256

      820b0a87ea75ddb38adaf629174dd060d4c6a0b8fae9d8a44fb0b5be22660c37

    • SHA512

      bfb02f8f49fa89813f691aca6ca5c1217caf3ea759f9d777337e6a7c1d67858c38aaa42bfa1d024702f6849cda884df33bdfd0e3fa041aecf4e8ccd0c53ecc97

    • SSDEEP

      12288:jMrMy90aGl5vADamMaxAS5U8UV9Mnz9GysYEhYs0jLYY21rUGvp/wciz722xOw:zyPcl8jK8UrW9GnIjLu1rHtwcin2K

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks