General

  • Target

    a90194e19551985c1a789c08ca8a3857ddaf4df916b190aeab5ada5daaf1f3ed

  • Size

    559KB

  • Sample

    241105-pa3zxs1amf

  • MD5

    60019f1a6d79db5ce56fdc1dc5fe5d58

  • SHA1

    85ff2492a1e91e6be07e7bb4876f266dab8105d7

  • SHA256

    a90194e19551985c1a789c08ca8a3857ddaf4df916b190aeab5ada5daaf1f3ed

  • SHA512

    12b6301a071f9d555d49f1c2272d0f5b7388258d4350fb40ecb3f35b2c8049fbb0436f7b5929552c56929511757ff7f100ed189e21786e68657890c016d479ef

  • SSDEEP

    12288:oMrby90DyioneBvmrm8aHVSTVbcRcERaz4CsXlC8:zyNiBvm67SVbdXkCi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      a90194e19551985c1a789c08ca8a3857ddaf4df916b190aeab5ada5daaf1f3ed

    • Size

      559KB

    • MD5

      60019f1a6d79db5ce56fdc1dc5fe5d58

    • SHA1

      85ff2492a1e91e6be07e7bb4876f266dab8105d7

    • SHA256

      a90194e19551985c1a789c08ca8a3857ddaf4df916b190aeab5ada5daaf1f3ed

    • SHA512

      12b6301a071f9d555d49f1c2272d0f5b7388258d4350fb40ecb3f35b2c8049fbb0436f7b5929552c56929511757ff7f100ed189e21786e68657890c016d479ef

    • SSDEEP

      12288:oMrby90DyioneBvmrm8aHVSTVbcRcERaz4CsXlC8:zyNiBvm67SVbdXkCi

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks