General

  • Target

    01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07

  • Size

    671KB

  • Sample

    241105-pkkw4a1hpn

  • MD5

    2e25ca50731f7badc86f47ba28dee1e0

  • SHA1

    18d365cca7954061d1b00ec7e17e539b1cfb1925

  • SHA256

    01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07

  • SHA512

    04936ed01e8ba3d313036d0478a08a9f705ae0f6a6502e7829c6b7f8ea528dce36de26a2ba149bd0fa4454e2a7b36a818b87cc6046125e5d369c0c9c7a899e35

  • SSDEEP

    12288:uMrvy90/u+M00R8NhmCf+kPHrTKAhbVTJXmCJRz7dEMXfA:tybv0TPX/bVT8Mfdfo

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07

    • Size

      671KB

    • MD5

      2e25ca50731f7badc86f47ba28dee1e0

    • SHA1

      18d365cca7954061d1b00ec7e17e539b1cfb1925

    • SHA256

      01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07

    • SHA512

      04936ed01e8ba3d313036d0478a08a9f705ae0f6a6502e7829c6b7f8ea528dce36de26a2ba149bd0fa4454e2a7b36a818b87cc6046125e5d369c0c9c7a899e35

    • SSDEEP

      12288:uMrvy90/u+M00R8NhmCf+kPHrTKAhbVTJXmCJRz7dEMXfA:tybv0TPX/bVT8Mfdfo

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks