General

  • Target

    8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031

  • Size

    529KB

  • Sample

    241105-mw29eazckf

  • MD5

    9d42c0c985d868e3320668c91fcfd677

  • SHA1

    c771dc34bae68c0918f990f90f47c0d39f21a6b6

  • SHA256

    8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031

  • SHA512

    959623967b6bc8adedabd18bf35a55f3d6849fe4d33ed23d8207b68e3b3b19a1de29b41fbad082e359c97b715eca0bc574c46d15e43fc555d13f608e6dc6dc26

  • SSDEEP

    12288:NMrKy90Kz/5Tbujfbot9ca17x9+OZI0CX+ekAfiMO:PyVqjq9ca16m5CZq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031

    • Size

      529KB

    • MD5

      9d42c0c985d868e3320668c91fcfd677

    • SHA1

      c771dc34bae68c0918f990f90f47c0d39f21a6b6

    • SHA256

      8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031

    • SHA512

      959623967b6bc8adedabd18bf35a55f3d6849fe4d33ed23d8207b68e3b3b19a1de29b41fbad082e359c97b715eca0bc574c46d15e43fc555d13f608e6dc6dc26

    • SSDEEP

      12288:NMrKy90Kz/5Tbujfbot9ca17x9+OZI0CX+ekAfiMO:PyVqjq9ca16m5CZq

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks