General

  • Target

    e939c50c8e11bbf674aec3e1eb94c454a0aab348f84435b1c5ec321806daa9dd

  • Size

    672KB

  • Sample

    241105-vtsaeswbnj

  • MD5

    43da137513df1c0f2ce73ef53efcbbc7

  • SHA1

    0f2b2a346d510bab3feff1ecc7fb6028a34ea5d6

  • SHA256

    e939c50c8e11bbf674aec3e1eb94c454a0aab348f84435b1c5ec321806daa9dd

  • SHA512

    6af02fd4147fab3ef62192cf464d6fe373cce1e0b11750b9d55bbf6975f8a64d920c96acaab71b8c2fb3c3c5824dc4b026f7270b991b606050148aca8d3e978a

  • SSDEEP

    12288:JMrEy90YDq5i4sUdAXKQn190LFRBjhvu7+Z/E0wfHomwZ+YH517pRCyJqAP4a:xyesUdSILFvhvEiM0wHo2oz/Cy0Ah

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      e939c50c8e11bbf674aec3e1eb94c454a0aab348f84435b1c5ec321806daa9dd

    • Size

      672KB

    • MD5

      43da137513df1c0f2ce73ef53efcbbc7

    • SHA1

      0f2b2a346d510bab3feff1ecc7fb6028a34ea5d6

    • SHA256

      e939c50c8e11bbf674aec3e1eb94c454a0aab348f84435b1c5ec321806daa9dd

    • SHA512

      6af02fd4147fab3ef62192cf464d6fe373cce1e0b11750b9d55bbf6975f8a64d920c96acaab71b8c2fb3c3c5824dc4b026f7270b991b606050148aca8d3e978a

    • SSDEEP

      12288:JMrEy90YDq5i4sUdAXKQn190LFRBjhvu7+Z/E0wfHomwZ+YH517pRCyJqAP4a:xyesUdSILFvhvEiM0wHo2oz/Cy0Ah

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks