General

  • Target

    2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e

  • Size

    529KB

  • Sample

    241105-mshqlaynh1

  • MD5

    957b9a8b8679f889a480dce419b3f524

  • SHA1

    df6db84661afbe3100ce25ef15a79e68b99b7cba

  • SHA256

    2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e

  • SHA512

    d39fc8c697eac08e3928923c307b6e328e328c323119b5b8325b498a2a471bbbcc3c8c046994332b69de7137b2328f9150108315a48354e4ee1bda3eaa728316

  • SSDEEP

    12288:VMrLy90yupTAOK9+usXYgGf0QRIP9H7s:Sy5uWsIgehIP9H7s

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e

    • Size

      529KB

    • MD5

      957b9a8b8679f889a480dce419b3f524

    • SHA1

      df6db84661afbe3100ce25ef15a79e68b99b7cba

    • SHA256

      2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e

    • SHA512

      d39fc8c697eac08e3928923c307b6e328e328c323119b5b8325b498a2a471bbbcc3c8c046994332b69de7137b2328f9150108315a48354e4ee1bda3eaa728316

    • SSDEEP

      12288:VMrLy90yupTAOK9+usXYgGf0QRIP9H7s:Sy5uWsIgehIP9H7s

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks