General

  • Target

    4182b68ed450ade30d6d8fb8ce68b43286e4920f989cf891f3cc95c22369535e

  • Size

    530KB

  • Sample

    241105-kdm1naxkhv

  • MD5

    dff214e5928c94408a2dae87c1d76313

  • SHA1

    d7e41d9b878c8662787df19efaba36529268efcf

  • SHA256

    4182b68ed450ade30d6d8fb8ce68b43286e4920f989cf891f3cc95c22369535e

  • SHA512

    cec772b8bacc9f756e3a496156f83dc2670fb147519ddd82969b633bfd6071297c616fb3da6973e5067e0d39ca99dd831dd747375b38d396d04030cc6bad0dab

  • SSDEEP

    12288:jMrEy9075wgMDTmqGaguO3E8DxBjHKaWmu:ryHmqhgh3E8NBDKb7

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      4182b68ed450ade30d6d8fb8ce68b43286e4920f989cf891f3cc95c22369535e

    • Size

      530KB

    • MD5

      dff214e5928c94408a2dae87c1d76313

    • SHA1

      d7e41d9b878c8662787df19efaba36529268efcf

    • SHA256

      4182b68ed450ade30d6d8fb8ce68b43286e4920f989cf891f3cc95c22369535e

    • SHA512

      cec772b8bacc9f756e3a496156f83dc2670fb147519ddd82969b633bfd6071297c616fb3da6973e5067e0d39ca99dd831dd747375b38d396d04030cc6bad0dab

    • SSDEEP

      12288:jMrEy9075wgMDTmqGaguO3E8DxBjHKaWmu:ryHmqhgh3E8NBDKb7

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks