General

  • Target

    d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95

  • Size

    530KB

  • Sample

    241105-rbae4svmaq

  • MD5

    f74832accaf28a4f8804a01114d7b4d3

  • SHA1

    05c7d413390cc544cac02965078c3ab547292aff

  • SHA256

    d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95

  • SHA512

    c6dcdbac37b190d962c06595a4d734899e50c7356c315120904df53e1a0c8e21994ca448393a7bc57409c52ca8a100fea1468f86436928bb57ff25a0c577b783

  • SSDEEP

    12288:gMrUy90RlAs6JLWxODILLTz3wCV1KaYQ7qBtkcEDyVDUnKN7:Eykt4ILPzACV0lQuyQx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95

    • Size

      530KB

    • MD5

      f74832accaf28a4f8804a01114d7b4d3

    • SHA1

      05c7d413390cc544cac02965078c3ab547292aff

    • SHA256

      d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95

    • SHA512

      c6dcdbac37b190d962c06595a4d734899e50c7356c315120904df53e1a0c8e21994ca448393a7bc57409c52ca8a100fea1468f86436928bb57ff25a0c577b783

    • SSDEEP

      12288:gMrUy90RlAs6JLWxODILLTz3wCV1KaYQ7qBtkcEDyVDUnKN7:Eykt4ILPzACV0lQuyQx

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks