General

  • Target

    1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764

  • Size

    677KB

  • Sample

    241105-rsmrrsvpeq

  • MD5

    9ac75fc25de237d143f7c9fc4f1a0851

  • SHA1

    f8e30586455def71072c63a163a76c369b3b5ffa

  • SHA256

    1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764

  • SHA512

    c41ee972a31f85a9b929a1ed79c0dff196a631f4424455f58c6ed4338c596eb8c81552177296507fb18cff413fa252aa7c011d4d0f6bb98120a3c8644723e086

  • SSDEEP

    12288:MMr4y908iIennFwUh++up0WV+rU6eCTxtUkyy0y5Kxep7upUuK8FIh0Ypit:EyziNFww+RiWIrUMTxW0Exep/uGpit

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764

    • Size

      677KB

    • MD5

      9ac75fc25de237d143f7c9fc4f1a0851

    • SHA1

      f8e30586455def71072c63a163a76c369b3b5ffa

    • SHA256

      1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764

    • SHA512

      c41ee972a31f85a9b929a1ed79c0dff196a631f4424455f58c6ed4338c596eb8c81552177296507fb18cff413fa252aa7c011d4d0f6bb98120a3c8644723e086

    • SSDEEP

      12288:MMr4y908iIennFwUh++up0WV+rU6eCTxtUkyy0y5Kxep7upUuK8FIh0Ypit:EyziNFww+RiWIrUMTxW0Exep/uGpit

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks