General

  • Target

    8ebe924a92e330d648c6d6cf30a59f8ae4df344398c21bd61d81a2f210cd0a16

  • Size

    673KB

  • Sample

    241105-p59e7ascpm

  • MD5

    0de6d48a55ab4ba51429be8fb3bee235

  • SHA1

    f3c4e897eb668cb7ccc7621f3e2c5689856061f8

  • SHA256

    8ebe924a92e330d648c6d6cf30a59f8ae4df344398c21bd61d81a2f210cd0a16

  • SHA512

    16d7fdc20924630b2552b6e5ee0b71ee6ac42455824faac8775c31b83b19403bed3531829a25d6b11694b3b18c0743ba668db2c42d597e330218c289aa293e41

  • SSDEEP

    12288:mMrwy90IRBS1cld8sWRfWZ5NbLRdZ0bxaxbuW7wclF4:iyLRAcWw5NPyxalu0fF4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      8ebe924a92e330d648c6d6cf30a59f8ae4df344398c21bd61d81a2f210cd0a16

    • Size

      673KB

    • MD5

      0de6d48a55ab4ba51429be8fb3bee235

    • SHA1

      f3c4e897eb668cb7ccc7621f3e2c5689856061f8

    • SHA256

      8ebe924a92e330d648c6d6cf30a59f8ae4df344398c21bd61d81a2f210cd0a16

    • SHA512

      16d7fdc20924630b2552b6e5ee0b71ee6ac42455824faac8775c31b83b19403bed3531829a25d6b11694b3b18c0743ba668db2c42d597e330218c289aa293e41

    • SSDEEP

      12288:mMrwy90IRBS1cld8sWRfWZ5NbLRdZ0bxaxbuW7wclF4:iyLRAcWw5NPyxalu0fF4

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks