General

  • Target

    8901fecf5fc3ba1d65c40db958c3ac400b6219c14b6c2f6cca1436f506f680b0

  • Size

    549KB

  • Sample

    241105-k3bnxsyarh

  • MD5

    1beaea2f1973ab26234f70dd6308486c

  • SHA1

    845bbd50fba4a7619f02287168e985bfab0898c3

  • SHA256

    8901fecf5fc3ba1d65c40db958c3ac400b6219c14b6c2f6cca1436f506f680b0

  • SHA512

    57371c735a39075b79f3b058d7c4f6b2dea456e11e09c9324bb162a266b54d1333f7955bfbb61f3f2a4ea0181e53bd1793e89160474d7aed436ac40daf751c80

  • SSDEEP

    12288:GMrey90wxl0mSwksOwu9aRdgLt3685UGlQV:8ynoHFsOwqagLt36hGli

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      8901fecf5fc3ba1d65c40db958c3ac400b6219c14b6c2f6cca1436f506f680b0

    • Size

      549KB

    • MD5

      1beaea2f1973ab26234f70dd6308486c

    • SHA1

      845bbd50fba4a7619f02287168e985bfab0898c3

    • SHA256

      8901fecf5fc3ba1d65c40db958c3ac400b6219c14b6c2f6cca1436f506f680b0

    • SHA512

      57371c735a39075b79f3b058d7c4f6b2dea456e11e09c9324bb162a266b54d1333f7955bfbb61f3f2a4ea0181e53bd1793e89160474d7aed436ac40daf751c80

    • SSDEEP

      12288:GMrey90wxl0mSwksOwu9aRdgLt3685UGlQV:8ynoHFsOwqagLt36hGli

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks