General

  • Target

    56778b678711130439914d30805efab01c57031800837f6e5fec76d1f6a7589a

  • Size

    689KB

  • Sample

    241105-s1lp4swncn

  • MD5

    652f6a829a8016f68f35e5cda2b6cade

  • SHA1

    1b2cecf7d51592a6802c8c67a93a72322f436f63

  • SHA256

    56778b678711130439914d30805efab01c57031800837f6e5fec76d1f6a7589a

  • SHA512

    ade46d877662d7c0d14ba0284b24b439ff45b3b542f1f5a0408caf665bd5b1be031f3275501a629fadfb86f82a69712a9f07183a4130e40ec4112b1d1ee9b242

  • SSDEEP

    12288:IMroy90XDBQY0HcOoKFfv43pnv7HcMWLuOMCbnb5+zchzi2o40J:QysDOcOoKFy8MWKO1EcwEi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      56778b678711130439914d30805efab01c57031800837f6e5fec76d1f6a7589a

    • Size

      689KB

    • MD5

      652f6a829a8016f68f35e5cda2b6cade

    • SHA1

      1b2cecf7d51592a6802c8c67a93a72322f436f63

    • SHA256

      56778b678711130439914d30805efab01c57031800837f6e5fec76d1f6a7589a

    • SHA512

      ade46d877662d7c0d14ba0284b24b439ff45b3b542f1f5a0408caf665bd5b1be031f3275501a629fadfb86f82a69712a9f07183a4130e40ec4112b1d1ee9b242

    • SSDEEP

      12288:IMroy90XDBQY0HcOoKFfv43pnv7HcMWLuOMCbnb5+zchzi2o40J:QysDOcOoKFy8MWKO1EcwEi

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks