General

  • Target

    37b66d9e1ed0f3ca3dce7704711a2b745db6c5a834e5aa4936a9d8c4b23c83f8

  • Size

    673KB

  • Sample

    241105-n85qqstjdm

  • MD5

    58c3b0b006a43731808b02ef44e36b81

  • SHA1

    619f91c8fb9e620502d04cca9ed178b0d26c1c3b

  • SHA256

    37b66d9e1ed0f3ca3dce7704711a2b745db6c5a834e5aa4936a9d8c4b23c83f8

  • SHA512

    a6777e537c865a3b12b5dd5e7037096faa016e31e30180b52b249e140a4a2a60cbe91512674b65914aaa1002c40d9188e7d534b444d710f2464344e9bebbf7d3

  • SSDEEP

    12288:9Mrxy90hGTKN1LZ6uFNYPEc5B4R0qpGBHjWiP7buWKZFvixt0:MyG5cufi9CRWBHiePu1niT0

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      37b66d9e1ed0f3ca3dce7704711a2b745db6c5a834e5aa4936a9d8c4b23c83f8

    • Size

      673KB

    • MD5

      58c3b0b006a43731808b02ef44e36b81

    • SHA1

      619f91c8fb9e620502d04cca9ed178b0d26c1c3b

    • SHA256

      37b66d9e1ed0f3ca3dce7704711a2b745db6c5a834e5aa4936a9d8c4b23c83f8

    • SHA512

      a6777e537c865a3b12b5dd5e7037096faa016e31e30180b52b249e140a4a2a60cbe91512674b65914aaa1002c40d9188e7d534b444d710f2464344e9bebbf7d3

    • SSDEEP

      12288:9Mrxy90hGTKN1LZ6uFNYPEc5B4R0qpGBHjWiP7buWKZFvixt0:MyG5cufi9CRWBHiePu1niT0

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks