General

  • Target

    6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486

  • Size

    659KB

  • Sample

    241105-qs2p9a1mft

  • MD5

    2a9bca58b055d33fc43f5cee5b7b5d25

  • SHA1

    d5677a19eaf7c4d4eabd3e6140354521324defa4

  • SHA256

    6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486

  • SHA512

    a1bf4b1a01754cc37aeaa8681df81aac249be5d7339cda199397bb08938fcb92b339bcf3538775dd236edb409fdbe32a9c56ff45e41a87c3e398d1d34083d7cc

  • SSDEEP

    12288:EMrsy90rQV99VWw9aV2wh9m19gND8fkHvrVbhUWK4IT43QmjXDH:wypV39aV269m19gND8fkHvrV1dqjmjX7

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486

    • Size

      659KB

    • MD5

      2a9bca58b055d33fc43f5cee5b7b5d25

    • SHA1

      d5677a19eaf7c4d4eabd3e6140354521324defa4

    • SHA256

      6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486

    • SHA512

      a1bf4b1a01754cc37aeaa8681df81aac249be5d7339cda199397bb08938fcb92b339bcf3538775dd236edb409fdbe32a9c56ff45e41a87c3e398d1d34083d7cc

    • SSDEEP

      12288:EMrsy90rQV99VWw9aV2wh9m19gND8fkHvrVbhUWK4IT43QmjXDH:wypV39aV269m19gND8fkHvrV1dqjmjX7

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks