General

  • Target

    b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3

  • Size

    537KB

  • Sample

    241105-qm63sa1hje

  • MD5

    d49c21694613ed18eb1bfcb48c9bd1ce

  • SHA1

    cfa3c6ceef6f0a90618f7d31cabc2e193de0460c

  • SHA256

    b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3

  • SHA512

    85e2d465aec35da92ec965da4001cacaabc88bdf08be6f2d77cf23c321e6064fdd1f75739e6e0eafbe922910a93a1ac01240192688df21a8c303cf09a76a227e

  • SSDEEP

    12288:xMrly90fzimHhWpg8z0eUqWHWwoJs3CtXlb:8y4HYPAem2wAs34t

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3

    • Size

      537KB

    • MD5

      d49c21694613ed18eb1bfcb48c9bd1ce

    • SHA1

      cfa3c6ceef6f0a90618f7d31cabc2e193de0460c

    • SHA256

      b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3

    • SHA512

      85e2d465aec35da92ec965da4001cacaabc88bdf08be6f2d77cf23c321e6064fdd1f75739e6e0eafbe922910a93a1ac01240192688df21a8c303cf09a76a227e

    • SSDEEP

      12288:xMrly90fzimHhWpg8z0eUqWHWwoJs3CtXlb:8y4HYPAem2wAs34t

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks