General

  • Target

    dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02

  • Size

    662KB

  • Sample

    241105-mscvcaynhx

  • MD5

    d4fff079c53894f98aff34cc28e8d77d

  • SHA1

    a63b87f88d0dfdfc48ec80119c00df38f226afe7

  • SHA256

    dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02

  • SHA512

    50ed616d5f567d210ec9482cd3fc97cd14765bc79a0fbe5a39d59205e3b822c8d335d9451997d1dd6751e50cfc6af0e500d20524bf21ccf0b774471918003c98

  • SSDEEP

    12288:ZMrQy9029p8FoiXje9S5cmkR1imM2l83BzV7A2qc4qgFryCYU:pyV9mFMten2lIV7A2qc4JrwU

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02

    • Size

      662KB

    • MD5

      d4fff079c53894f98aff34cc28e8d77d

    • SHA1

      a63b87f88d0dfdfc48ec80119c00df38f226afe7

    • SHA256

      dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02

    • SHA512

      50ed616d5f567d210ec9482cd3fc97cd14765bc79a0fbe5a39d59205e3b822c8d335d9451997d1dd6751e50cfc6af0e500d20524bf21ccf0b774471918003c98

    • SSDEEP

      12288:ZMrQy9029p8FoiXje9S5cmkR1imM2l83BzV7A2qc4qgFryCYU:pyV9mFMten2lIV7A2qc4JrwU

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks