General

  • Target

    90eb2244abea96c9994fb6c99e0babf76b5ceaf1945f7760f98c7fe4b60f8e51

  • Size

    529KB

  • Sample

    241105-ppr6zasank

  • MD5

    2329a5ac26ef685c0dcca69436ae456b

  • SHA1

    cc904e393ec11b91b1a8b2d328b144622fe6f2a3

  • SHA256

    90eb2244abea96c9994fb6c99e0babf76b5ceaf1945f7760f98c7fe4b60f8e51

  • SHA512

    4a35cdaa83e10976d946e0f6e3f263b577fd0ea74aa6c6dee913e42e9e05dd83560136f590cadc38951ca17848bcc5b040d52b396454902126593dd6b43f1554

  • SSDEEP

    12288:4Mr0y900hwTHAJHRB4Igb6nKSrjHoA2O:8yvhOHAJY1mnJrj6O

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      90eb2244abea96c9994fb6c99e0babf76b5ceaf1945f7760f98c7fe4b60f8e51

    • Size

      529KB

    • MD5

      2329a5ac26ef685c0dcca69436ae456b

    • SHA1

      cc904e393ec11b91b1a8b2d328b144622fe6f2a3

    • SHA256

      90eb2244abea96c9994fb6c99e0babf76b5ceaf1945f7760f98c7fe4b60f8e51

    • SHA512

      4a35cdaa83e10976d946e0f6e3f263b577fd0ea74aa6c6dee913e42e9e05dd83560136f590cadc38951ca17848bcc5b040d52b396454902126593dd6b43f1554

    • SSDEEP

      12288:4Mr0y900hwTHAJHRB4Igb6nKSrjHoA2O:8yvhOHAJY1mnJrj6O

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks