General

  • Target

    09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad

  • Size

    673KB

  • Sample

    241105-tqcvwstlhz

  • MD5

    817111ba05979ab9dd7ced975be4c9f8

  • SHA1

    af8cd68310a8a01c009564723c3987a1f51d8e0c

  • SHA256

    09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad

  • SHA512

    9ba1d18987064a4ab81181e9db2b63b85fc39d60c5f5af6ea03060ed63faae30047b6fe210c4cc3f90a213d7b5ca59209924c82744cf5fa3c587766197e163d6

  • SSDEEP

    12288:LMrgy90Cj2Q6FCzgwJZoyxq8H74fWgJPyXiJ1A61GW/F8jB:7y76rFC57tzHY5JyqAup/2jB

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad

    • Size

      673KB

    • MD5

      817111ba05979ab9dd7ced975be4c9f8

    • SHA1

      af8cd68310a8a01c009564723c3987a1f51d8e0c

    • SHA256

      09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad

    • SHA512

      9ba1d18987064a4ab81181e9db2b63b85fc39d60c5f5af6ea03060ed63faae30047b6fe210c4cc3f90a213d7b5ca59209924c82744cf5fa3c587766197e163d6

    • SSDEEP

      12288:LMrgy90Cj2Q6FCzgwJZoyxq8H74fWgJPyXiJ1A61GW/F8jB:7y76rFC57tzHY5JyqAup/2jB

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks