General

  • Target

    63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65

  • Size

    560KB

  • Sample

    241105-v7rk2svlcs

  • MD5

    24a8e98a7e10a2312697143ec276c2cd

  • SHA1

    db4175ad094d1ca247107941cc83ca8c7fa56083

  • SHA256

    63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65

  • SHA512

    bd5d102b46ab5b1f6697655c3c61d468a64c8ac8a4c3e94896b7e7f5b1c7152257b53e5d976c472fe2939bc65a32123e791944c0063593e8c228b3dcc7a22c1b

  • SSDEEP

    12288:VMrIy90ZDBh+MrLJIKaWvA+Sfx8ElxJqfx2QOFGXOe:hy4n+0rfC8El+fx2QOcL

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65

    • Size

      560KB

    • MD5

      24a8e98a7e10a2312697143ec276c2cd

    • SHA1

      db4175ad094d1ca247107941cc83ca8c7fa56083

    • SHA256

      63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65

    • SHA512

      bd5d102b46ab5b1f6697655c3c61d468a64c8ac8a4c3e94896b7e7f5b1c7152257b53e5d976c472fe2939bc65a32123e791944c0063593e8c228b3dcc7a22c1b

    • SSDEEP

      12288:VMrIy90ZDBh+MrLJIKaWvA+Sfx8ElxJqfx2QOFGXOe:hy4n+0rfC8El+fx2QOcL

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks