General

  • Target

    6508fd789b17d059e359f53dbfc351070c07327c91c8cbe34bedc66266fd7128

  • Size

    658KB

  • Sample

    241105-mrvnrszhkp

  • MD5

    0a9cc72bd813113746fe30d5d09e62ce

  • SHA1

    b27f2e1eb988570812f28802e5380707e93c14bd

  • SHA256

    6508fd789b17d059e359f53dbfc351070c07327c91c8cbe34bedc66266fd7128

  • SHA512

    b56838298ae2d6df6ed33bca2c099d08262f066ccf72700970a9448cbd0e5d44db4e4545b498e17f89509f16194b709b2598e6db2078bb3cccea8149523da728

  • SSDEEP

    12288:IMrUy90J70DjLbK0Yn2C9vR3NQCaTRP3KCvK/qiku2GgiG96gzg/EVeaOKBtwJUu:My64/bTYn2CdQH1S/qiF2Ggr97/5OKBQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      6508fd789b17d059e359f53dbfc351070c07327c91c8cbe34bedc66266fd7128

    • Size

      658KB

    • MD5

      0a9cc72bd813113746fe30d5d09e62ce

    • SHA1

      b27f2e1eb988570812f28802e5380707e93c14bd

    • SHA256

      6508fd789b17d059e359f53dbfc351070c07327c91c8cbe34bedc66266fd7128

    • SHA512

      b56838298ae2d6df6ed33bca2c099d08262f066ccf72700970a9448cbd0e5d44db4e4545b498e17f89509f16194b709b2598e6db2078bb3cccea8149523da728

    • SSDEEP

      12288:IMrUy90J70DjLbK0Yn2C9vR3NQCaTRP3KCvK/qiku2GgiG96gzg/EVeaOKBtwJUu:My64/bTYn2CdQH1S/qiF2Ggr97/5OKBQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks