General

  • Target

    9a7f23aa69d97228454821408b4f10bac1a7ffc7d5158f9b871c448ae92f7dcb

  • Size

    530KB

  • Sample

    241105-rhzcta1rev

  • MD5

    c4f2f3f9acd6c7b6d1952f341dfe5a3b

  • SHA1

    47a44e25a4016fa2841bea4943204fabe3281bd4

  • SHA256

    9a7f23aa69d97228454821408b4f10bac1a7ffc7d5158f9b871c448ae92f7dcb

  • SHA512

    f700674b30e1e2f5051547ddb99b03bc6d42cf0b825dafc74651130998ba43a1915790e67910c502827f9dacf4e772db933b92081739d8929db2976cb8c779b0

  • SSDEEP

    12288:kMryy90UnEX+5XK3lZ/8Ldg+aLzMlRrBSo05TJTf:OyHgXlFYdNPRr0HV

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      9a7f23aa69d97228454821408b4f10bac1a7ffc7d5158f9b871c448ae92f7dcb

    • Size

      530KB

    • MD5

      c4f2f3f9acd6c7b6d1952f341dfe5a3b

    • SHA1

      47a44e25a4016fa2841bea4943204fabe3281bd4

    • SHA256

      9a7f23aa69d97228454821408b4f10bac1a7ffc7d5158f9b871c448ae92f7dcb

    • SHA512

      f700674b30e1e2f5051547ddb99b03bc6d42cf0b825dafc74651130998ba43a1915790e67910c502827f9dacf4e772db933b92081739d8929db2976cb8c779b0

    • SSDEEP

      12288:kMryy90UnEX+5XK3lZ/8Ldg+aLzMlRrBSo05TJTf:OyHgXlFYdNPRr0HV

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks