General

  • Target

    870d8e2317eecbf0372f9e70b9e3a59776e24e77668b01a924cbff9b2be486c7

  • Size

    659KB

  • Sample

    241105-v95kpawelp

  • MD5

    63ecddcbf73d48c882b99242b018fe74

  • SHA1

    99536862508f191deb8345ebac973aa5e16c1718

  • SHA256

    870d8e2317eecbf0372f9e70b9e3a59776e24e77668b01a924cbff9b2be486c7

  • SHA512

    29e8056b9d9e882540608237bcc3ca6caa31beaede3db9df76a5a45e2b30b1486a21cf1e535e1a5a0e95a2d0540ff2e2469ee241d930fef0d35a1b384936fe74

  • SSDEEP

    12288:UMrSy90zahNeKEVgWjuCAeHh6D56kXyqs6hlx:GykB/i2UDkw

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      870d8e2317eecbf0372f9e70b9e3a59776e24e77668b01a924cbff9b2be486c7

    • Size

      659KB

    • MD5

      63ecddcbf73d48c882b99242b018fe74

    • SHA1

      99536862508f191deb8345ebac973aa5e16c1718

    • SHA256

      870d8e2317eecbf0372f9e70b9e3a59776e24e77668b01a924cbff9b2be486c7

    • SHA512

      29e8056b9d9e882540608237bcc3ca6caa31beaede3db9df76a5a45e2b30b1486a21cf1e535e1a5a0e95a2d0540ff2e2469ee241d930fef0d35a1b384936fe74

    • SSDEEP

      12288:UMrSy90zahNeKEVgWjuCAeHh6D56kXyqs6hlx:GykB/i2UDkw

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks