General

  • Target

    c4a39d3ca9e1a00d92634f7b0e8ad2b724f775fe6a6e47b1327f7e4bc4556b02

  • Size

    689KB

  • Sample

    241105-smy4aaspey

  • MD5

    d2935f85df4297ba511a2132d7147aa7

  • SHA1

    daadfae6d3a8cfa6db02cfe4e8d4d51b40ef5b63

  • SHA256

    c4a39d3ca9e1a00d92634f7b0e8ad2b724f775fe6a6e47b1327f7e4bc4556b02

  • SHA512

    46c3b3bea78398367c3f54c907f21bf5c4e727386bf0ef1fc9142351ba87fc5a94c9bf323b2ed473778e757b3bed2ca1cc4a2f0da84430e738c68820639499d4

  • SSDEEP

    12288:gMruy900e4iuOAXGz1CdG+f04XMDtT8+4WSVMkzDlUVmx0lv1o7gcc8:ey7Flp2z1WG+fG7mM0DlQJ1o7Rc8

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      c4a39d3ca9e1a00d92634f7b0e8ad2b724f775fe6a6e47b1327f7e4bc4556b02

    • Size

      689KB

    • MD5

      d2935f85df4297ba511a2132d7147aa7

    • SHA1

      daadfae6d3a8cfa6db02cfe4e8d4d51b40ef5b63

    • SHA256

      c4a39d3ca9e1a00d92634f7b0e8ad2b724f775fe6a6e47b1327f7e4bc4556b02

    • SHA512

      46c3b3bea78398367c3f54c907f21bf5c4e727386bf0ef1fc9142351ba87fc5a94c9bf323b2ed473778e757b3bed2ca1cc4a2f0da84430e738c68820639499d4

    • SSDEEP

      12288:gMruy900e4iuOAXGz1CdG+f04XMDtT8+4WSVMkzDlUVmx0lv1o7gcc8:ey7Flp2z1WG+fG7mM0DlQJ1o7Rc8

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks