General

  • Target

    389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834

  • Size

    660KB

  • Sample

    241105-qwh3basamc

  • MD5

    f74d1a2bf11255bdde8a51631d1c30f7

  • SHA1

    ed7952128c0f7494f5b67a83947c8099f3ab07a5

  • SHA256

    389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834

  • SHA512

    b7f5970a24ac5ba7c8a5bdde87248c638de76b6bdaa17bbacafd7b2791b31f0adcc32ca26ed0931537b35d2ca505a3a99b66b8b7acbf0042e17c5b1130d730fa

  • SSDEEP

    12288:WMrSy90Qk+lTegY7kx0w0PyLHtUL1N2yr2T:AygaY00w0mHtULLHG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834

    • Size

      660KB

    • MD5

      f74d1a2bf11255bdde8a51631d1c30f7

    • SHA1

      ed7952128c0f7494f5b67a83947c8099f3ab07a5

    • SHA256

      389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834

    • SHA512

      b7f5970a24ac5ba7c8a5bdde87248c638de76b6bdaa17bbacafd7b2791b31f0adcc32ca26ed0931537b35d2ca505a3a99b66b8b7acbf0042e17c5b1130d730fa

    • SSDEEP

      12288:WMrSy90Qk+lTegY7kx0w0PyLHtUL1N2yr2T:AygaY00w0mHtULLHG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks