General

  • Target

    306288bc290cc8483380daa3b55aa9bb71c5ae9b855e9e9546e513cdaf1347b3

  • Size

    1002KB

  • Sample

    241105-smxkfswldn

  • MD5

    7b493b508e414d0f17d4875e171827df

  • SHA1

    59e90fdd60340b0ed635d2128eded3778133f39a

  • SHA256

    306288bc290cc8483380daa3b55aa9bb71c5ae9b855e9e9546e513cdaf1347b3

  • SHA512

    39c2850cc95a498615141edbee9d5fda0d5173c7a87f9e275d006b3ea78c5200eb9478b90d3b4774ffbfa94c7229cb66aef075ef912ed4aca08716ca182eff88

  • SSDEEP

    24576:zy6L02wBGllmdxrHkO8yvu/iO9BYE1n+PwoRtr8qPporjG4vm:GcllmdvY5Xe/YqPs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      306288bc290cc8483380daa3b55aa9bb71c5ae9b855e9e9546e513cdaf1347b3

    • Size

      1002KB

    • MD5

      7b493b508e414d0f17d4875e171827df

    • SHA1

      59e90fdd60340b0ed635d2128eded3778133f39a

    • SHA256

      306288bc290cc8483380daa3b55aa9bb71c5ae9b855e9e9546e513cdaf1347b3

    • SHA512

      39c2850cc95a498615141edbee9d5fda0d5173c7a87f9e275d006b3ea78c5200eb9478b90d3b4774ffbfa94c7229cb66aef075ef912ed4aca08716ca182eff88

    • SSDEEP

      24576:zy6L02wBGllmdxrHkO8yvu/iO9BYE1n+PwoRtr8qPporjG4vm:GcllmdvY5Xe/YqPs

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks