General

  • Target

    95d69bd4060f152d8f73e81419f868d203c2561f900a62ec5abe158f43c49efc

  • Size

    700KB

  • Sample

    241105-mptcxsskdm

  • MD5

    fedfd81e5b8bba4b330f5746747c194d

  • SHA1

    b66954d5fd3e10d634a2b0eaf66d51e0a3b6ffe2

  • SHA256

    95d69bd4060f152d8f73e81419f868d203c2561f900a62ec5abe158f43c49efc

  • SHA512

    50bcae607fe8f7db5fcf89c4272bae09e8794e4e5e98392aff5f6e798de44fd56209d190124b50c434cec4a8bdb911e6c9ee473a67bc3d5c1ac799c008f7bda3

  • SSDEEP

    12288:TMrZy90bwi++S1nUcP33ZC9DMJcA6GNTqlNTQ4pD1tu606OQ3X:qyR1nU03p6Eq/lD1U83X

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      95d69bd4060f152d8f73e81419f868d203c2561f900a62ec5abe158f43c49efc

    • Size

      700KB

    • MD5

      fedfd81e5b8bba4b330f5746747c194d

    • SHA1

      b66954d5fd3e10d634a2b0eaf66d51e0a3b6ffe2

    • SHA256

      95d69bd4060f152d8f73e81419f868d203c2561f900a62ec5abe158f43c49efc

    • SHA512

      50bcae607fe8f7db5fcf89c4272bae09e8794e4e5e98392aff5f6e798de44fd56209d190124b50c434cec4a8bdb911e6c9ee473a67bc3d5c1ac799c008f7bda3

    • SSDEEP

      12288:TMrZy90bwi++S1nUcP33ZC9DMJcA6GNTqlNTQ4pD1tu606OQ3X:qyR1nU03p6Eq/lD1U83X

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks