General

  • Target

    244b24acdbea146c2718a08b2fa1ce43436c2c41a481884b6e81cf8fec779b50

  • Size

    521KB

  • Sample

    241105-l2r5ysygmc

  • MD5

    096bf50907f1730896bfff4183a45c33

  • SHA1

    bb83c6f7bbc4dca30c9d3db2a318e958430056f9

  • SHA256

    244b24acdbea146c2718a08b2fa1ce43436c2c41a481884b6e81cf8fec779b50

  • SHA512

    d10a2001253fb11c483fcc132ae725b51cddfe2a1604ac0baa362b7f85f6d826fbcbc47b8b17eef7794cafbdebe5da041508e377bf9b711269d954bfe51c9d7e

  • SSDEEP

    12288:iMryy904BCfmxEwrRMH6qyDm8X7DT7+R:Iy9iPH6qyDbTSR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      244b24acdbea146c2718a08b2fa1ce43436c2c41a481884b6e81cf8fec779b50

    • Size

      521KB

    • MD5

      096bf50907f1730896bfff4183a45c33

    • SHA1

      bb83c6f7bbc4dca30c9d3db2a318e958430056f9

    • SHA256

      244b24acdbea146c2718a08b2fa1ce43436c2c41a481884b6e81cf8fec779b50

    • SHA512

      d10a2001253fb11c483fcc132ae725b51cddfe2a1604ac0baa362b7f85f6d826fbcbc47b8b17eef7794cafbdebe5da041508e377bf9b711269d954bfe51c9d7e

    • SSDEEP

      12288:iMryy904BCfmxEwrRMH6qyDm8X7DT7+R:Iy9iPH6qyDbTSR

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks